CN107615358A - For identifying the Verification System and method of authorized participant - Google Patents
For identifying the Verification System and method of authorized participant Download PDFInfo
- Publication number
- CN107615358A CN107615358A CN201580078198.8A CN201580078198A CN107615358A CN 107615358 A CN107615358 A CN 107615358A CN 201580078198 A CN201580078198 A CN 201580078198A CN 107615358 A CN107615358 A CN 107615358A
- Authority
- CN
- China
- Prior art keywords
- unmanned vehicle
- user
- flight
- readable media
- unmanned
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 406
- 238000012795 verification Methods 0.000 title claims abstract description 181
- 238000004891 communication Methods 0.000 claims abstract description 712
- 230000008859 change Effects 0.000 claims description 152
- RZVHIXYEVGDQDX-UHFFFAOYSA-N 9,10-anthraquinone Chemical group C1=CC=C2C(=O)C3=CC=CC=C3C(=O)C2=C1 RZVHIXYEVGDQDX-UHFFFAOYSA-N 0.000 claims description 151
- 230000001052 transient effect Effects 0.000 claims description 151
- 230000008569 process Effects 0.000 claims description 107
- 230000015654 memory Effects 0.000 claims description 94
- 230000005540 biological transmission Effects 0.000 claims description 58
- 230000006870 function Effects 0.000 claims description 46
- 238000012545 processing Methods 0.000 claims description 30
- 230000006378 damage Effects 0.000 claims description 22
- 230000005611 electricity Effects 0.000 claims description 19
- 239000000543 intermediate Substances 0.000 claims description 16
- 238000012360 testing method Methods 0.000 claims description 14
- 238000013475 authorization Methods 0.000 claims description 12
- 238000012986 modification Methods 0.000 claims description 12
- 230000004048 modification Effects 0.000 claims description 12
- 210000000056 organ Anatomy 0.000 claims description 11
- 230000000712 assembly Effects 0.000 claims description 10
- 238000000429 assembly Methods 0.000 claims description 10
- 230000007123 defense Effects 0.000 claims description 10
- 230000002829 reductive effect Effects 0.000 claims description 10
- 230000001755 vocal effect Effects 0.000 claims description 7
- 230000003287 optical effect Effects 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 5
- 230000008520 organization Effects 0.000 claims description 5
- 238000005538 encapsulation Methods 0.000 claims description 4
- 239000000446 fuel Substances 0.000 claims description 3
- 210000001525 retina Anatomy 0.000 claims description 3
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 claims 1
- 230000005236 sound signal Effects 0.000 claims 1
- 238000003860 storage Methods 0.000 description 199
- 230000004044 response Effects 0.000 description 90
- 230000033001 locomotion Effects 0.000 description 71
- 230000007613 environmental effect Effects 0.000 description 69
- 230000000875 corresponding effect Effects 0.000 description 63
- 230000000694 effects Effects 0.000 description 63
- 230000005055 memory storage Effects 0.000 description 60
- 230000006399 behavior Effects 0.000 description 56
- 230000032258 transport Effects 0.000 description 50
- 238000001514 detection method Methods 0.000 description 45
- 230000009471 action Effects 0.000 description 42
- 238000012544 monitoring process Methods 0.000 description 39
- 238000007726 management method Methods 0.000 description 38
- 230000000007 visual effect Effects 0.000 description 37
- 230000001276 controlling effect Effects 0.000 description 33
- 238000011156 evaluation Methods 0.000 description 32
- 230000007246 mechanism Effects 0.000 description 32
- 230000001133 acceleration Effects 0.000 description 29
- 238000005259 measurement Methods 0.000 description 26
- 230000003068 static effect Effects 0.000 description 24
- 238000005516 engineering process Methods 0.000 description 22
- 230000001105 regulatory effect Effects 0.000 description 22
- 230000001788 irregular Effects 0.000 description 19
- 230000004888 barrier function Effects 0.000 description 18
- 230000004438 eyesight Effects 0.000 description 18
- 230000003993 interaction Effects 0.000 description 18
- 238000010586 diagram Methods 0.000 description 17
- 230000001141 propulsive effect Effects 0.000 description 16
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 15
- 238000004458 analytical method Methods 0.000 description 12
- 102100039292 Cbp/p300-interacting transactivator 1 Human genes 0.000 description 11
- 101000888413 Homo sapiens Cbp/p300-interacting transactivator 1 Proteins 0.000 description 11
- 230000001010 compromised effect Effects 0.000 description 10
- 241001465754 Metazoa Species 0.000 description 8
- 230000033228 biological regulation Effects 0.000 description 8
- 235000013399 edible fruits Nutrition 0.000 description 8
- NBIIXXVUZAFLBC-UHFFFAOYSA-N Phosphoric acid Chemical compound OP(O)(O)=O NBIIXXVUZAFLBC-UHFFFAOYSA-N 0.000 description 7
- 238000004422 calculation algorithm Methods 0.000 description 7
- 238000003384 imaging method Methods 0.000 description 7
- 230000000670 limiting effect Effects 0.000 description 7
- 238000013439 planning Methods 0.000 description 7
- 238000012549 training Methods 0.000 description 7
- 238000013519 translation Methods 0.000 description 7
- 230000010006 flight Effects 0.000 description 6
- 238000004519 manufacturing process Methods 0.000 description 6
- 238000001556 precipitation Methods 0.000 description 6
- 241000894007 species Species 0.000 description 6
- 206010000117 Abnormal behaviour Diseases 0.000 description 5
- 240000002853 Nelumbo nucifera Species 0.000 description 5
- 235000006508 Nelumbo nucifera Nutrition 0.000 description 5
- 235000006510 Nelumbo pentapetala Nutrition 0.000 description 5
- 230000009850 completed effect Effects 0.000 description 5
- 230000002452 interceptive effect Effects 0.000 description 5
- 238000012423 maintenance Methods 0.000 description 5
- 238000001228 spectrum Methods 0.000 description 5
- 238000005303 weighing Methods 0.000 description 5
- 230000000737 periodic effect Effects 0.000 description 4
- 239000000523 sample Substances 0.000 description 4
- 230000002123 temporal effect Effects 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 238000004846 x-ray emission Methods 0.000 description 4
- 101100365087 Arabidopsis thaliana SCRA gene Proteins 0.000 description 3
- 241000208340 Araliaceae Species 0.000 description 3
- 101000668165 Homo sapiens RNA-binding motif, single-stranded-interacting protein 1 Proteins 0.000 description 3
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 3
- 235000003140 Panax quinquefolius Nutrition 0.000 description 3
- 102100039692 RNA-binding motif, single-stranded-interacting protein 1 Human genes 0.000 description 3
- 101150105073 SCR1 gene Proteins 0.000 description 3
- 101100134054 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) NTG1 gene Proteins 0.000 description 3
- 208000027418 Wounds and injury Diseases 0.000 description 3
- 230000008485 antagonism Effects 0.000 description 3
- 230000003139 buffering effect Effects 0.000 description 3
- 238000013500 data storage Methods 0.000 description 3
- 238000000151 deposition Methods 0.000 description 3
- 238000009826 distribution Methods 0.000 description 3
- 238000005265 energy consumption Methods 0.000 description 3
- 235000008434 ginseng Nutrition 0.000 description 3
- 230000000977 initiatory effect Effects 0.000 description 3
- 208000014674 injury Diseases 0.000 description 3
- 238000007689 inspection Methods 0.000 description 3
- 239000000203 mixture Substances 0.000 description 3
- 238000005070 sampling Methods 0.000 description 3
- 230000035945 sensitivity Effects 0.000 description 3
- 230000011664 signaling Effects 0.000 description 3
- 238000007619 statistical method Methods 0.000 description 3
- 201000009032 substance abuse Diseases 0.000 description 3
- 241000196324 Embryophyta Species 0.000 description 2
- 240000007594 Oryza sativa Species 0.000 description 2
- 235000007164 Oryza sativa Nutrition 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 2
- 239000000654 additive Substances 0.000 description 2
- 230000000996 additive effect Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 239000000969 carrier Substances 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 230000001186 cumulative effect Effects 0.000 description 2
- 230000024703 flight behavior Effects 0.000 description 2
- 238000005242 forging Methods 0.000 description 2
- 210000003128 head Anatomy 0.000 description 2
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000000465 moulding Methods 0.000 description 2
- 239000000047 product Substances 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 235000009566 rice Nutrition 0.000 description 2
- 230000035939 shock Effects 0.000 description 2
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 2
- 239000004575 stone Substances 0.000 description 2
- 239000000126 substance Substances 0.000 description 2
- 241000271566 Aves Species 0.000 description 1
- 241000282465 Canis Species 0.000 description 1
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 241001481833 Coryphaena hippurus Species 0.000 description 1
- 108020004414 DNA Proteins 0.000 description 1
- 241001269238 Data Species 0.000 description 1
- 241000282326 Felis catus Species 0.000 description 1
- PEDCQBHIVMGVHV-UHFFFAOYSA-N Glycerine Chemical compound OCC(O)CO PEDCQBHIVMGVHV-UHFFFAOYSA-N 0.000 description 1
- 241000238631 Hexapoda Species 0.000 description 1
- 241001365789 Oenanthe crocata Species 0.000 description 1
- 241001494479 Pecora Species 0.000 description 1
- 241000283984 Rodentia Species 0.000 description 1
- 101150080315 SCS2 gene Proteins 0.000 description 1
- 101100072644 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) INO2 gene Proteins 0.000 description 1
- 101100454372 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) LCB2 gene Proteins 0.000 description 1
- 101100489624 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) RTS1 gene Proteins 0.000 description 1
- 241000519996 Teucrium chamaedrys Species 0.000 description 1
- 239000000853 adhesive Substances 0.000 description 1
- 230000001070 adhesive effect Effects 0.000 description 1
- 230000002411 adverse Effects 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 238000005452 bending Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 239000012472 biological sample Substances 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 239000008280 blood Substances 0.000 description 1
- 210000004369 blood Anatomy 0.000 description 1
- 230000037396 body weight Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000010367 cloning Methods 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000008094 contradictory effect Effects 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000003745 diagnosis Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 230000008034 disappearance Effects 0.000 description 1
- 239000000428 dust Substances 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000010438 heat treatment Methods 0.000 description 1
- 238000005286 illumination Methods 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 230000006651 lactation Effects 0.000 description 1
- 230000007787 long-term memory Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000006386 memory function Effects 0.000 description 1
- 230000008450 motivation Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000036961 partial effect Effects 0.000 description 1
- 230000032696 parturition Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000005622 photoelectricity Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000012913 prioritisation Methods 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000000284 resting effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000000979 retarding effect Effects 0.000 description 1
- 210000003296 saliva Anatomy 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001235 sensitizing effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 239000002689 soil Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 239000000758 substrate Substances 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 239000000725 suspension Substances 0.000 description 1
- 238000010408 sweeping Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 238000010977 unit operation Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
- 230000003442 weekly effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/04—Anti-collision systems
- G08G5/045—Navigation or guidance aids, e.g. determination of anti-collision manoeuvers
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05D—SYSTEMS FOR CONTROLLING OR REGULATING NON-ELECTRIC VARIABLES
- G05D1/00—Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
- G05D1/0011—Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots associated with a remote control arrangement
- G05D1/0027—Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots associated with a remote control arrangement involving a plurality of vehicles, e.g. fleet or convoy travelling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0004—Transmission of traffic-related information to or from an aircraft
- G08G5/0008—Transmission of traffic-related information to or from an aircraft with other aircraft
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0004—Transmission of traffic-related information to or from an aircraft
- G08G5/0013—Transmission of traffic-related information to or from an aircraft with a ground station
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0017—Arrangements for implementing traffic-related aircraft activities, e.g. arrangements for generating, displaying, acquiring or managing traffic information
- G08G5/0026—Arrangements for implementing traffic-related aircraft activities, e.g. arrangements for generating, displaying, acquiring or managing traffic information located on the ground
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/003—Flight plan management
- G08G5/0034—Assembly of a flight plan
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/003—Flight plan management
- G08G5/0039—Modification of a flight plan
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0043—Traffic management of multiple aircrafts from the ground
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0047—Navigation or guidance aids for a single aircraft
- G08G5/0052—Navigation or guidance aids for a single aircraft for cruising
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0047—Navigation or guidance aids for a single aircraft
- G08G5/0056—Navigation or guidance aids for a single aircraft in an emergency situation, e.g. hijacking
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0047—Navigation or guidance aids for a single aircraft
- G08G5/006—Navigation or guidance aids for a single aircraft in accordance with predefined flight zones, e.g. to avoid prohibited zones
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0047—Navigation or guidance aids for a single aircraft
- G08G5/0069—Navigation or guidance aids for a single aircraft specially adapted for an unmanned aircraft
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0073—Surveillance aids
- G08G5/0078—Surveillance aids for monitoring traffic from the aircraft
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0073—Surveillance aids
- G08G5/0082—Surveillance aids for monitoring traffic from a ground station
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0073—Surveillance aids
- G08G5/0086—Surveillance aids for monitoring terrain
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G5/00—Traffic control systems for aircraft, e.g. air-traffic control [ATC]
- G08G5/0073—Surveillance aids
- G08G5/0091—Surveillance aids for monitoring atmospheric conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
- H04W4/022—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences with dynamic range variability
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B64—AIRCRAFT; AVIATION; COSMONAUTICS
- B64U—UNMANNED AERIAL VEHICLES [UAV]; EQUIPMENT THEREFOR
- B64U2101/00—UAVs specially adapted for particular uses or applications
- B64U2101/20—UAVs specially adapted for particular uses or applications for use as communications relays, e.g. high-altitude platforms
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B64—AIRCRAFT; AVIATION; COSMONAUTICS
- B64U—UNMANNED AERIAL VEHICLES [UAV]; EQUIPMENT THEREFOR
- B64U2101/00—UAVs specially adapted for particular uses or applications
- B64U2101/30—UAVs specially adapted for particular uses or applications for imaging, photography or videography
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B64—AIRCRAFT; AVIATION; COSMONAUTICS
- B64U—UNMANNED AERIAL VEHICLES [UAV]; EQUIPMENT THEREFOR
- B64U2201/00—UAVs characterised by their flight controls
- B64U2201/10—UAVs characterised by their flight controls autonomous, i.e. by navigating independently from ground or air stations, e.g. by using inertial navigation systems [INS]
- B64U2201/104—UAVs characterised by their flight controls autonomous, i.e. by navigating independently from ground or air stations, e.g. by using inertial navigation systems [INS] using satellite radio beacon positioning systems, e.g. GPS
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B64—AIRCRAFT; AVIATION; COSMONAUTICS
- B64U—UNMANNED AERIAL VEHICLES [UAV]; EQUIPMENT THEREFOR
- B64U2201/00—UAVs characterised by their flight controls
- B64U2201/20—Remote controls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Aviation & Aerospace Engineering (AREA)
- Remote Sensing (AREA)
- Radar, Positioning & Navigation (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Mathematical Physics (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Life Sciences & Earth Sciences (AREA)
- Atmospheric Sciences (AREA)
- Automation & Control Theory (AREA)
- Traffic Control Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides the system and method for unmanned vehicle safety.It can confirm unmanned vehicle and/or user identity using Verification System and the secure communication between user and unmanned vehicle is provided.The unmanned vehicle can operate according to one group of air traffic control.Described group of air traffic control can be associated with the geography fence device near the unmanned vehicle.
Description
Background technology
The unmanned apparatuss of transport such as unmanned vehicle (UAV) are developed to various fields, including consumer's application
And sector application.For example, can manipulate unmanned vehicle be used to entertaining, photographic/camera, monitoring, delivering or other application.
Unmanned vehicle has expanded the aspect of personal lifestyle.However, as the use of unmanned vehicle becomes more widespread,
There is safety problem and challenge.For example, when the flight of unmanned vehicle is unrestricted, unmanned vehicle may forbidden flying
Or the overlying regions flight of flight should be forbidden.This is probably intentionally or accidentally to occur.In some cases, novice users can
The control to unmanned vehicle can be lost or be unfamiliar with aviation flight rule.Also there is abduction or hacker attacks unmanned flight
The potential risk of the control of device.
The content of the invention
Security system and method described herein improve unmanned vehicle (UAV) flight safety.Flight can be provided
Control and Verification System and method, the system and method can aid in the use of tracking unmanned vehicle.The system can
To uniquely identify out interactive each side's (for example, user, remote control, unmanned vehicle, geography fence device).At some
In the case of, verification process can occur and only have authorized party to be allowed to operate the unmanned vehicle.Air traffic control can
To put in the operation of unmanned vehicle, and can be with the manual control of override (override) user.In some cases,
Geography fence device may be used to provide the information or the help air traffic control process on air traffic control.
One aspect of the present invention is related to the system for controlling unmanned vehicle (UAV), and the system includes:First is logical
Believe module;And one or more processors, it is operably coupled to the first communication module and separately or together
Ground is configured for:Indicate that the user of user type marks using the first communication module or second communication module to receive
Know symbol;One group of air traffic control for the unmanned vehicle is generated based on the user identifier;And use described the
One communication module or the second communication module to transmit one group of air traffic control to the unmanned vehicle.
In addition, the aspect of the present invention can provide a kind of method for being used to control unmanned vehicle (UAV), methods described bag
Include:Receive the user identifier for indicating user type;By means of one or more processors, based on the user identifier
One group air traffic control of the generation for the unmanned vehicle;And by means of communication module, transmitted to the unmanned vehicle
One group of air traffic control.
According to aspects of the present invention, a kind of programmed instruction for including and being used for controlling unmanned vehicle (UAV) can be provided
Non-transient computer-readable media, the computer-readable medium include:User's mark of user type is indicated for receiving
The programmed instruction of symbol;For generating the journey of one group of air traffic control for the unmanned vehicle based on the user identifier
Sequence instructs;And for generating signal to transmit one group of air traffic control to the unmanned vehicle by means of communication module
Programmed instruction.
In addition, the aspect of the present invention can be related to a kind of unmanned vehicle (UAV).The unmanned vehicle may include:One
Individual or multiple propulsion units, it realizes the flight of the unmanned vehicle;Communication module, it is configured for from long-distance user
Receive one or more flight orders;And flight control units, it is configured for generation and pushed away to one or more of
Enter the flight control signal of unit delivering, wherein the flight control signal is flown according to one group for the unmanned vehicle
Row control and generate, wherein the air traffic control is the user identifier based on the user type for indicating the long-distance user
And generate.
The aspect of the present invention can also include a kind of system for being used to control unmanned vehicle (UAV), and the system includes:
First communication module;And one or more processors, it is operably coupled to the first communication module and individually
Or jointly it is configured for:Using the first communication module or second communication module unmanned vehicle is indicated to receive
The unmanned vehicle identifier of type;One group for the unmanned vehicle is generated based on the unmanned vehicle identifier
Air traffic control;And transmit described one group to the unmanned vehicle using the first communication module or second communication module
Air traffic control.
According to further aspect of the invention, a kind of method for being used to control unmanned vehicle (UAV) can be provided, it is described
Method includes:Receive the unmanned vehicle identifier for indicating unmanned vehicle type;By means of one or more processors, base
One group of air traffic control for the unmanned vehicle is generated in the unmanned vehicle identifier;And by means of the mould that communicates
Block, one group of air traffic control is transmitted to the unmanned vehicle.
Moreover, the aspect of the present invention can be related to a kind of programmed instruction for including and being used for controlling unmanned vehicle (UAV)
Non-transient computer-readable media, the computer-readable medium include:The nothing of unmanned vehicle type is indicated for receiving
The programmed instruction of people's aircraft identifier;For being generated based on the unmanned vehicle identifier for the unmanned vehicle
One group of air traffic control programmed instruction;And for generate signal with by means of communication module and to the unmanned vehicle pass
The programmed instruction of defeated one group of air traffic control.
One aspect of the present invention can be related to a kind of unmanned vehicle (UAV), including:One or more propulsion units,
It realizes the flight of the unmanned vehicle;Communication module, it is configured for receiving one or more fly from long-distance user
Line command;And flight control units, it is configured for the flight that generation delivers to one or more of propulsion units
Control signal, wherein the flight control signal is generated according to one group of air traffic control for the unmanned vehicle,
Wherein described air traffic control be the unmanned vehicle identifier based on the unmanned vehicle type for indicating the long-distance user and
Generation.
Further aspect of the invention can be related to a kind of unmanned vehicle (UAV), including:Flight control units, its quilt
It is disposed for controlling the operation of the unmanned vehicle;And mark module, it is integrated into the flight control units,
Wherein described mark module uniquely identifies out the unmanned vehicle from other unmanned vehicles.
In addition, the aspect of the present invention can provide a kind of method of mark unmanned vehicle (UAV), methods described includes:
The operation of the unmanned vehicle is controlled using flight control units;And use and be integrated into the flight control units
Mark module uniquely identifies out the unmanned vehicle from other unmanned vehicles.
According to certain aspects of the invention, unmanned vehicle (UAV) can include:Flight control units, it is configured to
For controlling the operation of the unmanned vehicle, wherein the flight control units include mark module and chip, wherein described
Mark module is configured for (1) and the unmanned vehicle is uniquely identified out from other unmanned vehicles, (2) include pair
The letter on the chip is collected in the original records of the chip, and (3) after including the original records to the chip
Breath, wherein the mark module is configured for undergoing self-check program, the self-check program will collect on the chip
Information compared with to the original records of the chip, and wherein described mark module is configured for when being collected
Information on the chip and inconsistent original records to the chip when warning is provided.
The aspect of the present invention can also relate to a kind of method of mark unmanned vehicle (UAV), and methods described includes:Use
Flight control units control the operation of the unmanned vehicle, wherein the flight control units include mark module and core
Piece;The unmanned vehicle is uniquely identified out from other unmanned vehicles using the mark module, wherein the mark
Knowing module includes the original records to the chip;Collect after including the original records to the chip on the chip
Information;Using the mark module, by the information on the chip collected with being carried out to the original records of the chip
Compare, so as to undergo self-check program;And when the information on the chip collected and the initial note to the chip
Warning is provided when recording inconsistent.
According to further aspect of the invention, a kind of unmanned vehicle (UAV) payload control system can be provided.Institute
The system of stating can include:First communication module;And one or more processors, it is operably coupled to first module
And either individually or collectively it is configured for:Indicated using the first communication module or second communication module to receive
The payload for relying on position uses the signal of parameter;And generation realizes effective load using parameter in accordance with the payload
One or more unmanned vehicle operation signals of lotus operation.
In addition, the aspect of the present invention can be related to what a kind of payload for constraining unmanned vehicle (UAV) used
Method, methods described include:Receive the signal for indicating that the payload for relying on position uses parameter;And by means of one or
One or more unmanned flights that the payload realizes payload operation using parameter are observed in multiple processors, generation
Device operation signal.
The additional aspect of the present invention can provide a kind of payload for being used to constrain unmanned vehicle (UAV) that includes and use
Programmed instruction non-transient computer-readable media, the computer-readable medium includes:Dependence position is indicated for receiving
The payload put uses the programmed instruction of the signal of parameter;And observe the payload for generating and use parameter and reality
The programmed instruction of one or more unmanned vehicle operation signals of existing effect load operation.
According to an aspect of the present invention, a kind of unmanned vehicle (UAV) can be provided, the unmanned vehicle includes:
Payload;Communication module, it is configured for receiving one or more payload orders from long-distance user;And
Flight control units, it is configured for generation and is delivered to the payload or supports the carrier of the payload
Payload control signal, wherein the payload control signal be according to one or more unmanned vehicle operation signals and
Generation, wherein the unmanned vehicle operation signal is to be generated based on the payload for relying on position using parameter.
The aspect of the present invention can be related to a kind of unmanned vehicle (UAV) communication control system, including:First communication mould
Block;And one or more processors, its be operably coupled to Hu first communication module and either individually or collectively by
It is disposed for:Indicate that the communication for relying on position uses ginseng using the first communication module or second communication module to receive
Several signals;And one or more of the operation for communicating and unmanned vehicle communication unit being realized using parameter is observed in generation
Individual unmanned vehicle operation signal.
Moreover, the aspect of the present invention can include a kind of method for being used to constrain the radio communication of unmanned vehicle (UAV),
Methods described includes:Receive and indicate signal of the communication for relying on position using parameter;And handled by means of one or more
One or more unmanned vehicles operation that the payload realizes the operation of communication unit using parameter is observed in device, generation
Signal.
According to the additional aspect of the present invention, a kind of channel radio for including and being used for constraining unmanned vehicle (UAV) can be provided
The non-transient computer-readable media of the programmed instruction of letter, the computer-readable medium include:Dependence is indicated for receiving
The communication of position uses the programmed instruction of the signal of parameter;And realize communication using parameter in accordance with the communication for generating
The programmed instruction of one or more unmanned vehicle operation signals of the operation of unit.
The method of the present invention can also relate to a kind of unmanned vehicle (UAV), including:Communication unit, it is configured to use
In reception or transmission radio communication;And flight control units, it is configured for generation and is delivered to the communication unit
To realize the communications control signal of the operation of the communication unit, wherein the communications control signal is according to one or more nothings
People's aircraft operation signal and generate, wherein the unmanned vehicle operation signal be based on rely on position communication using ginseng
Count and generate.
Further aspect of the invention can be related to a kind of method of operation unmanned vehicle (UAV), and methods described includes:
Unmanned vehicle identifier is received, the unmanned vehicle identifier uniquely identifies out the nothing from other unmanned vehicles
People's aircraft;User identifier is received, the user identifier uniquely identifies out the user from other users;By means of
One or more processors, assess whether the user identified by the user identifier is authorized to operation by the unmanned vehicle
The unmanned vehicle of identifier mark;And when the user is authorized to and operates the unmanned vehicle, it is allowed to the user
The unmanned vehicle is operated.
According to aspects of the present invention, a kind of programmed instruction for including and being used for operating unmanned vehicle (UAV) can be provided
Non-transient computer-readable media.The computer-readable medium can include:For receiving from other unmanned vehicles only
One ground identifies the programmed instruction of the unmanned vehicle identifier of the unmanned vehicle;It is unique from other users for receiving
Ground identifies the programmed instruction of the user identifier of the user;For whether assessing the user identified by the user identifier
It is authorized to the programmed instruction for the unmanned vehicle that operation is identified by the unmanned vehicle identifier;And in the user
Being authorized to when operating the unmanned vehicle allows the programmed instruction that the user is operated to the unmanned vehicle.
One aspect of the present invention can provide a kind of unmanned vehicle (UAV) authoring system, including:At one or more
Device is managed, it is either individually or collectively configured for:Receive unmanned vehicle identifier, the unmanned vehicle identifier from
The unmanned vehicle is uniquely identified out in other unmanned vehicles;Receive user identifier, the user identifier from its
The user is uniquely identified out in his user;Assess whether the user identified by the user identifier is authorized to operation by institute
State the unmanned vehicle of unmanned vehicle identifier mark;And when the user is authorized to and operates the unmanned vehicle,
Transmission signal is to allow the user to operate the unmanned vehicle.
In addition, the aspect of the present invention can be related to a kind of method of operation unmanned vehicle (UAV), methods described includes:
The identity of unmanned vehicle is authenticated, wherein the identity of the unmanned vehicle can be uniquely regional with other unmanned vehicles
Separate;The identity of user is authenticated, wherein the identity of the user can uniquely distinguish with other users;By means of one
Individual or multiple processors, assess whether the user is authorized to the operation unmanned vehicle;And when the user is authorized to
Operate the unmanned vehicle and when the unmanned vehicle and the user pass through certification, it is allowed to which the user is to described
Unmanned vehicle is operated.
In addition, according to aspects of the present invention, a kind of program for being used to operate unmanned vehicle (UAV) that includes can be provided and referred to
The non-transient computer-readable media of order, the computer-readable medium include:For recognizing the identity of unmanned vehicle
The programmed instruction of card, wherein the identity of the unmanned vehicle can uniquely distinguish with other unmanned vehicles;For to
The programmed instruction that the identity at family is authenticated, wherein the identity of the user can uniquely distinguish with other users;For by means of
One or more processors are helped to assess the programmed instruction whether user is authorized to the operation unmanned vehicle;And use
In when the user is authorized to the operation unmanned vehicle and the unmanned vehicle and the user pass through certification
The programmed instruction for allowing the user to operate the unmanned vehicle.
One aspect of the present invention can also relate to a kind of unmanned vehicle (UAV) Verification System, including:It is one or more
Processor, it is either individually or collectively configured for:The identity of unmanned vehicle is authenticated, wherein it is described nobody fly
The identity of row device can uniquely distinguish with other unmanned vehicles;The identity of user is authenticated, wherein the user
Identity can uniquely distinguish with other users;Assess whether the user is authorized to the operation unmanned vehicle;And work as
The user, which is authorized to operate when the unmanned vehicle and the unmanned vehicle and the user pass through certification, transmits
Signal, to allow the user to operate the unmanned vehicle.
Moreover, the aspect of the present invention can be related to a kind of authentication level for determining the operation for unmanned vehicle (UAV)
Method, methods described includes:Receive the context information on the unmanned vehicle;Use one or more processors, base
The certification degree of the user to the unmanned vehicle or the unmanned vehicle is assessed in the context information;According to described
Certification degree realizes the certification to the unmanned vehicle or the user;And allow when completing the certification of the degree
The user operates to the unmanned vehicle.
According to aspects of the present invention, a kind of include can be provided to be used to determine recognizing for operation unmanned vehicle (UAV)
The non-transient computer-readable media of horizontal programmed instruction is demonstrate,proved, the computer-readable medium includes:For receiving on institute
State the programmed instruction of the context information of unmanned vehicle;For being assessed based on the context information to the unmanned vehicle or
The programmed instruction of the certification degree of the user of the unmanned vehicle;For according to the certification degree come realize to it is described nobody
The programmed instruction of the certification of aircraft or the user;And allow the use for being provided when completing the certification of the degree
The programmed instruction for the signal that family is operated to the unmanned vehicle.
In addition, the aspect of the present invention can be related to a kind of unmanned vehicle (UAV) Verification System, including:It is one or more
Processor, it is either individually or collectively configured for:Receive the context information on the unmanned vehicle;Based on described
Context information and the certification degree for assessing the user to the unmanned vehicle or the unmanned vehicle;And recognized according to described
Card degree realizes the certification to the unmanned vehicle or the user.
According to aspects of the present invention, a kind of air traffic control grade of the operation for unmanned vehicle (UAV) can be provided
Method, methods described includes:Using one or more processors, assess to the unmanned vehicle or the unmanned vehicle
User certification degree;Certification to the unmanned vehicle or the user is realized according to the certification degree;It is based on
The certification degree and generate one group of air traffic control;And realized according to one group of air traffic control to the unmanned vehicle
Operation.
Further aspect of the invention can be related to a kind of include and be used to determine air traffic control of unmanned vehicle (UAV) etc.
The non-transient computer-readable media of the programmed instruction of level, the computer-readable medium include:For assessing to unmanned flight
The programmed instruction of the certification degree of the user of device or unmanned vehicle;For realized according to the certification degree to it is described nobody
The programmed instruction of the certification of aircraft or the user;For generating the program of one group of air traffic control based on the certification degree
Instruction;And the program for providing the signal for allowing to be operated to unmanned vehicle according to one group of air traffic control refers to
Order.
In addition, the aspect of the present invention can provide a kind of unmanned vehicle (UAV) Verification System, including:It is one or more
Processor, it is either individually or collectively configured for:Assess the use to the unmanned vehicle or the unmanned vehicle
The certification degree at family;Certification to the unmanned vehicle or the user is realized according to the certification degree;And it is based on
The certification degree and generate one group of air traffic control.
According to an aspect of the present invention, one kind can be provided when the operation to unmanned vehicle (UAV) is compromised
The method for alerting user.Methods described can include:User is authenticated to realize the operation to the unmanned vehicle;From
The remote control one or more for receiving user's input is ordered to realize the operation to the unmanned vehicle;Detection interference comes
From the unwarranted communication of one or more orders of the user;And via the remote control, on described without awarding
The communication of power and alert the user.
The aspect of the present invention also includes a kind of include and is used to alert when the operation to unmanned vehicle (UAV) is compromised
The non-transient computer-readable media of the programmed instruction of user, the computer-readable medium include:For recognizing user
Demonstrate,prove to realize the programmed instruction of the operation to the unmanned vehicle;For from receive user input remote control one or
It is multiple to order to realize the programmed instruction of the operation to the unmanned vehicle;And for generate will via the remote control and
The programmed instruction of the warning of the user is supplied to, the warning is on one of detected, interference from the user
Or the unwarranted communication of multiple orders.
In addition, one aspect of the present invention can be related to a kind of unmanned vehicle (UAV) warning system, including:One or
Multiple processors, it is either individually or collectively configured for:User is authenticated to realize to the unmanned vehicle
Operation;Ordered from the remote control for receiving user's input is one or more to realize the operation to the unmanned vehicle;
The unwarranted communication of one or more orders of the detection interference from the user;And generation signal is with via described distant
Control device alerts the user on the unwarranted communication.
According to the additional aspect of the present invention, a kind of method of the flight deviation of detection unmanned vehicle (UAV) can be provided,
Methods described includes:The one or more flight orders provided by user from remote control are provided;Handled by means of one or more
Device, the predicted position of the unmanned vehicle is calculated based on one or more of flight orders;By means of one or more
Sensor detects the physical location of the unmanned vehicle;By the predicted position compared with the physical location with true
Determine the deviation in unmanned vehicle behavior;And provide the unmanned vehicle not based on the deviation in unmanned vehicle behavior
The risk instruction operated according to one or more of flight orders.
According to certain aspects of the invention, it is inclined that a kind of flight included for detecting unmanned vehicle (UAV) can be provided
The non-transient computer-readable media of the programmed instruction of difference, the computer-readable medium include:For based on by user from distant
One or more flight orders that control device provides calculate the programmed instruction of the predicted position of the unmanned vehicle;For by
The programmed instruction of the physical location of the unmanned vehicle is detected in one or more sensors;For by the predicted position
And the physical location is compared to determine the programmed instruction of the deviation in unmanned vehicle behavior;And for based on nobody
Deviation in aircraft behavior and the wind that the unmanned vehicle does not operate according to one or more of flight orders is provided
The programmed instruction nearly indicated.
One aspect of the present invention can be related to a kind of unmanned vehicle (UAV) flight deviation detecting system, including:One
Or multiple processors, it is either individually or collectively configured for:The one or more provided by user from remote control is provided
Flight orders;The predicted position of the unmanned vehicle is calculated based on one or more of flight orders;By means of one
Or multiple sensors detect the physical location of the unmanned vehicle;The predicted position and the physical location are compared
Compared with to determine the deviation in unmanned vehicle behavior;And generation signal is described to be provided based on unmanned vehicle Deviant behavior
The risk instruction that unmanned vehicle does not operate according to one or more of flight orders.
Moreover, one aspect of the present invention can be related to a kind of method of record unmanned vehicle (UAV) behavior, the side
Method includes:Unmanned vehicle identifier is received, the unmanned vehicle identifier uniquely identifies from other unmanned vehicles
Go out the unmanned vehicle;User identifier is received, the user identifier uniquely identifies out the use from other users
Family, wherein the user provides one or more orders via remote control to realize the operation to the unmanned vehicle;With
And recorded in one or more Memory Storage Units it is one or more of order, it is related to one or more of orders
The user identifier and the unmanned vehicle identifier associated with one or more of orders of connection.
According to aspects of the present invention, a kind of program for being used to record unmanned vehicle (UAV) behavior that includes can be provided to refer to
The non-transient computer-readable media of order, the computer-readable medium include:For by user identifier and from user's
The associated programmed instruction of one or more order, wherein the user identifier uniquely identified out from other users it is described
User, and wherein described user provides one or more orders via remote control to realize the behaviour to the unmanned vehicle
Make;For by the unmanned vehicle identifier programmed instruction associated with one or more of orders, wherein it is described nobody fly
Row device identifier uniquely identifies out the unmanned vehicle from other unmanned vehicles;And for being deposited in one or more
One or more of orders, the user associated with one or more of orders mark are recorded in reservoir memory cell
The programmed instruction of symbol and the unmanned vehicle identifier associated with one or more of orders.
The aspect of the present invention can include a kind of unmanned vehicle (UAV) behavior record system, including:One or more is deposited
Reservoir memory cell;And one or more processors, it is operably coupled to one or more of memory storage lists
Member and be either individually or collectively configured for:Receive unmanned vehicle identifier, the unmanned vehicle identifier from
The unmanned vehicle is uniquely identified out in other unmanned vehicles;Receive user identifier, the user identifier from its
The user is uniquely identified out in his user, wherein the user provides one or more orders via remote control to realize
Operation to the unmanned vehicle;And one or more of lives are recorded in one or more Memory Storage Units
Make, the user identifier associated with one or more of orders and associated with one or more of orders
The unmanned vehicle identifier.
According to aspects of the present invention, a kind of system for being used to operate unmanned vehicle (UAV), the system bag can be provided
Include:Identity registry database, it is configured for storage and uniquely identifies out one of unmanned vehicle relative to each other
Or multiple unmanned vehicle identifiers and uniquely identify out one or more user identifiers of user relative to each other;
Authentication center, it is configured for being authenticated the identity of unmanned vehicle and the identity of user;And air traffic control system, its
It is configured for receiving the unmanned vehicle identifier of authenticated unmanned vehicle and the user identifier of authenticated user entities, and
And provide one group of air traffic control based at least one in the following:Certified unmanned vehicle identifier and authenticated
User identifier.
Further aspect of the invention can provide a kind of method for the position for determining unmanned vehicle (UAV), the side
Method includes:One or more message from the unmanned vehicle are received at multiple loggers;In the multiple logger
Locate to stamp timestamp for one or more of message from the unmanned vehicle;And handled by means of one or more
Device, the timestamp based on one or more of message and calculate the position of the unmanned vehicle.
In some aspects of the invention, a kind of position for including and being used for determining unmanned vehicle (UAV) can be provided
The non-transient computer-readable media of programmed instruction, the computer-readable medium include:For being received at multiple loggers
The programmed instruction of one or more message from the unmanned vehicle;For being from described at the multiple logger
One or more of message of unmanned vehicle stamp the programmed instruction of timestamp;And for based on one or more of
The timestamp of message and calculate the programmed instruction of the position of the unmanned vehicle.
According to further aspect of the invention, a kind of unmanned vehicle (UAV) communication position system, the system can be provided
System includes:Communication module;And one or more processors, its be operably coupled to the communication module and individually or
Jointly be configured to based on from the unmanned vehicle send and away from the unmanned vehicle multiple loggers at connect
The timestamp of the one or more message received and calculate the position of the unmanned vehicle.
According to aspects of the present invention, a kind of method being authenticated to unmanned vehicle (UAV), methods described can be provided
Including:The certification request from unmanned vehicle is received, wherein the certification request includes unmanned vehicle identifier;Retrieval pair
The information of unmanned vehicle identifier described in Ying Yu;Authentication vector is generated based on the information retrieved, wherein the certification
Vector comprises at least authentication token;The authentication token and key metewand are transmitted to the unmanned vehicle, wherein described
Unmanned vehicle is based on message authentication code and the authentication vector is authenticated, and the message authentication code is to be based on the certification
Token, the key metewand and encode key on the unmanned vehicle and generate;Reception comes from the nothing
The response of people's aircraft, wherein the response is based on the key metewand and encodes close on the unmanned vehicle
Key;And the certification request is verified based on the response received from the unmanned vehicle.
The additional aspect of the present invention can provide a kind of system being authenticated to unmanned vehicle (UAV), the system
Including:Authentication module;Communication module;And one or more processors, it is operably coupled to the authentication module and institute
State communication module and be either individually or collectively configured for:Receive the certification request from unmanned vehicle, wherein institute
Stating certification request includes unmanned vehicle identifier;Information of the retrieval corresponding to the unmanned vehicle identifier;Based on being examined
Rope to information and generate authentication vector, wherein the authentication vector comprises at least authentication token;Passed to the unmanned vehicle
The defeated authentication token and key metewand, wherein the unmanned vehicle is based on message authentication code and to the authentication vector
Be authenticated, the message authentication code be based on the authentication token, the key metewand and coding it is described nobody
Carry-on key and generate;The response from the unmanned vehicle is received, wherein the response is based on the key
The key of metewand and coding on the unmanned vehicle;It is and right based on the response received from the unmanned vehicle
The certification request is verified.
In addition, the aspect of the present invention can be related to a kind of program for including and being used for being authenticated to unmanned vehicle (UAV)
The non-transient computer-readable media of instruction, the computer-readable medium include:For receiving recognizing from unmanned vehicle
The programmed instruction of request is demonstrate,proved, wherein the certification request includes unmanned vehicle identifier;For retrieve correspond to it is described nobody
The programmed instruction of the information of aircraft identifier;For generating the programmed instruction of authentication vector based on the information retrieved,
Wherein described authentication vector comprises at least authentication token;Commented for transmitting the authentication token and key to the unmanned vehicle
The programmed instruction of valency benchmark, wherein the unmanned vehicle is based on message authentication code and is authenticated to the authentication vector, institute
It is close on the unmanned vehicle based on the authentication token, the key metewand and coding to state message authentication code
Key and generate;For receiving the programmed instruction of the response from the unmanned vehicle, wherein the response is based on described close
The key of key metewand and coding on the unmanned vehicle;And for based on the sound received from the unmanned vehicle
The programmed instruction answered and verified to the certification request.
According to certain aspects of the invention, a kind of method being authenticated to authentication center, methods described bag can be provided
Include:The certification request from unmanned vehicle is provided to authentication center, wherein the certification request identifies including unmanned vehicle
Symbol;The authentication vector from the authentication center is received, wherein the authentication vector includes authentication token and key metewand,
And wherein described authentication token be based on it is retrieving, generate corresponding to the information of the unmanned vehicle identifier;
Identification sequences number are calculated based on the authentication token;Based on the key metewand and coding in the unmanned vehicle
On key and generate certification key;Determine to disappear based on the authentication token, the identification sequences number and the certification key
Cease authentication code;And the authentication center is entered based at least one in the identification sequences number and the message authentication code
Row certification, the message authentication code are by being determined received from the authentication vector of the authentication center.
According to aspects of the present invention, a kind of system being authenticated to authentication center can be provided, the system includes:Recognize
Demonstrate,prove module;Communication module;And one or more processors, it is operably coupled to the authentication module and the communication mould
Block and either individually or collectively it is configured for:The certification request from the unmanned vehicle is provided to authentication center,
Wherein described certification request includes unmanned vehicle identifier;Authentication vector is received from the authentication center, wherein the certification
Vector includes authentication token and key metewand, and wherein described authentication token be based on it is retrieving, corresponding to described
The information of unmanned vehicle identifier and generate;Identification sequences number are calculated based on the authentication token;Based on the key
Metewand and encode key on the unmanned vehicle and generate certification key;Based on the authentication token, described
Identification sequences number and the certification key and determine message authentication code;And based on the identification sequences number and the message authentication
Code in it is at least one and the authentication center is authenticated, the message authentication code is by received from the authentication center
The authentication vector and determine.
The aspect of the present invention can also relate to a kind of non-wink for the programmed instruction for including and being used for being authenticated to authentication center
State computer-readable medium, the computer-readable medium include:The unmanned vehicle is come from for being provided to authentication center
Certification request programmed instruction, wherein the certification request includes unmanned vehicle identifier;For from the authentication center
The programmed instruction of authentication vector is received, wherein the authentication vector includes authentication token and key metewand, and wherein institute
State authentication token be based on it is retrieving, generate corresponding to the information of the unmanned vehicle identifier;For based on institute
State authentication token and calculate the programmed instruction of identification sequences number;For based on the key metewand and coding in the nothing
The carry-on key of people and generate the programmed instruction of certification key;For based on the authentication token, the identification sequences number
The programmed instruction of message authentication code is determined with the certification key;And for based on the identification sequences number and the message
At least one in authentication code and the programmed instruction being authenticated to the authentication center, the message authentication code is to pass through reception
Determined from the authentication vector of the authentication center.
Alerted in addition, the aspect of the present invention can be related to one kind when the operation to unmanned vehicle (UAV) is compromised
The method of user, methods described include:User is authenticated to realize the operation to the unmanned vehicle;From reception user
The remote control of input is one or more to order to realize the operation to the unmanned vehicle;Detection interference comes from the use
The unwarranted communication of one or more orders at family;And make institute in response to the detection to the unwarranted communication
State unmanned vehicle and flown while the unwarranted communication is ignored to predetermined and gone home a little.
According to aspects of the present invention, a kind of include can be provided to be used for when the operation to unmanned vehicle (UAV) is endangered
The non-transient computer-readable media of the programmed instruction of user is alerted during evil, the computer-readable medium includes:For to
Family is authenticated to realize the programmed instruction of the operation to the unmanned vehicle;For being connect from the remote control for receiving user's input
One or more orders are received to realize the programmed instruction of the operation to the unmanned vehicle;And for respond to it is described without
The detection of the communication of mandate and the unmanned vehicle is flown while the unwarranted communication is ignored to predetermined and return
The programmed instruction of destination.
According to further aspect of the invention, a kind of unmanned vehicle (UAV) warning system can be provided, including:One
Or multiple processors, it is either individually or collectively configured for:User is authenticated to realize to the unmanned flight
The operation of device;Ordered from the remote control for receiving user's input is one or more to realize the behaviour to the unmanned vehicle
Make;The unwarranted communication of one or more orders of the detection interference from the user;And in response to it is described without
The detection of the communication of mandate and the unmanned vehicle is flown while the unwarranted communication is ignored to predetermined
Go home a little.
It should be understood that the different aspect of the present invention can be understood individually, jointly or in conjunction.Retouched herein
The various aspects of the invention stated go for any application-specific being set forth below or suitable for any other types
Loose impediment.Any description to aircraft such as unmanned vehicles is applicable to and for any mobile article herein
Body, such as any apparatus of transport.In addition, disclosed system, device and side under the scene of motion in the air herein (for example, flight)
Method can be applicable under the scene of other types motion, movement such as on the ground or on the water, sub-aqua sport or
Motion in space.
By investigating specification, claims and accompanying drawing, the other objects and features of the invention will become obvious.
Brief description of the drawings
It has been specifically explained in the appended claims the novel feature of the present invention.By reference to using this wherein
The features as discussed above that the illustrated embodiment of inventive principle is illustrated by, it will to the features and advantages of the present invention
It is better understood from;In the accompanying drawings:
Fig. 1 is shown according between one or more users of embodiment of the present invention and one or more unmanned vehicles
Interactive example.
Fig. 2 shows the example of the Verification System according to embodiment of the present invention.
Fig. 3 shows to be shown according to the one or more factors that may participate in one group of air traffic control of generation of embodiment of the present invention
Example.
Fig. 4 shows the example of the flight control units according to embodiment of the present invention.
Fig. 5 shows the additional example of the flight control units according to embodiment of the present invention.
Fig. 6 shows the flight control of the mark of the chip on the tracking flight control units according to embodiment of the present invention
The example of unit processed.
Fig. 7 shows the diagram of the scene for being associated with polytype air traffic control according to embodiment of the present invention.
Fig. 8 shows to consider whether user is authorized to the process of operation unmanned vehicle according to embodiment of the present invention.
Fig. 9 shows to determine whether that user operates the process of unmanned vehicle according to embodiment of the present invention.
Figure 10 show according to embodiment of the present invention can be by the diagram for the air traffic control grade that certification degree is influenceed.
Figure 11 shows the example for storing device information in memory according to embodiment of the present invention.
Figure 12 shows to attempt the diagram of the scene of adapter control unmanned vehicle according to the hijacker of embodiment of the present invention.
Figure 13 shows the example of the unmanned vehicle flight deviation according to embodiment of the present invention.
Figure 14 shows the example of the monitoring system using one or more loggers according to embodiment of the present invention.
Figure 15 shows the diagram according to two-way authentication between the unmanned vehicle of embodiment of the present invention and authentication center.
Figure 16 shows the process for being used to send the message with ciphering signature according to embodiment of the present invention.
Figure 17 shows to be used for by the way that signature is decrypted to verify another mistake of message according to embodiment of the present invention
Journey.
Figure 18 shows the example of the unmanned vehicle and geography fence device according to embodiment of the present invention.
Figure 19 shows the side according to the geography fence device of embodiment of the present invention, geography fence border and unmanned vehicle
View.
Figure 20, which shows directly to be transmitted to unmanned vehicle according to the device of geography fence wherein of embodiment of the present invention, to be believed
The system of breath.
Figure 21 is shown in which the system that air traffic control system can communicate with geography fence device and/or unmanned vehicle.
Figure 22 shows the system that geography fence device is detected according to the unmanned vehicle wherein of embodiment of the present invention.
Figure 23 shows unmanned vehicle wherein and geography fence device according to embodiment of the present invention without straight each other
Connect the example of the unmanned vehicle system of letter.
Figure 24 shows the example can with the geography fence device of multiple flight restricted areas.
Figure 25 shows the process for being used to generate one group of air traffic control according to embodiment of the present invention.
Figure 26 is shown according to embodiment of the present invention for the process that is authenticated to geographical fence apparatus.
Figure 27 shows another example of the device information stored in memory according to embodiment of the present invention.
Figure 28 shows to be enclosed according to the geography that can provide different groups of flight restrictions in different scenes of embodiment of the present invention
Column device.
Figure 29 show according to embodiment of the present invention have can over time and change multigroup air traffic control ground
Manage the example of fence apparatus.
Figure 30 shows that nothing can be provided in the overlapping area of multiple geography fence devices according to embodiment of the present invention
The scene of people's aircraft.
Figure 31 shows the example of the different control for different geographical fence apparatus according to one aspect of the invention.
Figure 32 shows the example of the mobile geographical fence apparatus according to embodiment of the present invention.
Figure 33 shows the example of the mobile geographical fence apparatus closer to each other according to embodiment of the present invention.
Figure 34 shows another example of the mobile geographical fence apparatus according to embodiment of the present invention.
Figure 35 shows the use for showing the information on one or more geography fence devices according to embodiment of the present invention
The example at family interface.
Figure 36 illustrates the unmanned vehicle according to embodiment of the present invention.
Figure 37 illustrates the loose impediment for including carrier and payload according to embodiment of the present invention.
Figure 38 illustrates the system for controlling loose impediment according to embodiment of the present invention.
Figure 39 shows different types of logical between unmanned vehicle and geography fence device according to embodiment of the present invention
Letter.
Figure 40 shows that (it is each with corresponding geographical with multiple geography fence devices according to embodiment of the present invention
Fence identifier) example.
Figure 41 shows the air traffic control system wherein and multiple unmanned vehicles and multiple geography according to embodiment of the present invention
The example for the unmanned vehicle system that fence apparatus interacts.
Figure 42 show one in environment and environment with the unmanned vehicle that can travel through flight path or
The example of multiple geography fence devices.
Figure 43 provides can receive user's input to control one or more geography to enclose according to embodiment of the present invention
The example of the device of column device.
Figure 44 provide according to the geography fence device of embodiment of the present invention can how with private residence be used together with
Limit the diagram used of unmanned vehicle.
Figure 45 is provided according to how the geography fence device of embodiment of the present invention can be used to block unmanned vehicle
Diagram.
Embodiment
The unmanned apparatuss of transport such as unmanned vehicle (UAV) can pacify according to the flight for improving unmanned apparatus of transport
Complete security system and operate.Any description to unmanned vehicle goes for any kind of unmanned apparatus of transport herein
(for example, the apparatus of transport based on sky, the apparatus of transport based on land, the apparatus of transport based on water or the carrying based on space
Instrument).The flight control for helping to monitor and controlling unmanned vehicle to use and Verification System and method can be provided.The system
System can uniquely identify out interactive each side's (for example, user, remote control, unmanned vehicle, geography fence device).
Under certain situation, verification process can occur and only have authorized party to be allowed to operate unmanned vehicle.Air traffic control can
To put in the operation of unmanned vehicle, and can be with the manual control of override user.Geography fence device can be used for carrying
For the information on air traffic control or help air traffic control process.Geography fence device can be one or more geography fences
Border provides physical reference, and one or more of geography fence borders can be associated with corresponding one group of air traffic control.
Can occur in many different forms in the flight safety challenge of unmanned vehicle during use.It is for example, traditional
On, the flight of unmanned vehicle is unrestricted (for example, unmanned vehicle should may fly at it above forbidden somewhere).
For example, unmanned vehicle may fly to sensitizing range (for example, airport, military base) without permission.In addition, unmanned flight
Device may fly into the navigation channel of other aircraft without permission.Unmanned vehicle may without permission fly to enterprise and lead
Ground or personal manor, cause noise pollution, personnel's injury and property loss.In some cases, unmanned vehicle may be without
Ground flight is authorized to public domain, and personnel's injury and property loss may be caused.Provided herein is system and method can be with
One group of air traffic control is provided, described group of air traffic control can apply necessary limitation to unmanned vehicle, and the limitation can be
Based on geography, time-based and/or based on activity.Unmanned vehicle can be in the situation without the input from user
It is lower to observe air traffic control automatically.In some cases, can based on can the air traffic control that is manually entered of the override from user and
Generate the control to unmanned vehicle.
The flight of unmanned vehicle can be controlled by user by means of one or more remote controls.In some cases,
The potential risk being held as a hostage in the presence of flight.Hijacker may interfere with instruction of the authorized user to unmanned vehicle.If nothing
People's aircraft receives and receives to forge instruction, then it may perform uncontrolled task and produce adverse consequences.Carry herein
The system and method for confession can identify when to kidnap.When kidnapping, the system and method can alert user.Institute
Stating system and method can also make unmanned vehicle take action in response to detected abduction, and can be kidnapped with override
The control of person.
Unmanned vehicle can with airborne be carried available for the various sensors for obtaining data.Hacker may attempt to steal institute
The data of acquisition.For example, the data of unmanned vehicle may be trapped, or transmitted by remote wireless link to ground
Data may be monitored.Provided herein is system and method can provide encryption and certification, to cause only authorized use
Family can receive data.
In another example of unmanned vehicle flight safety challenge, unmanned vehicle may be abused.Traditionally, especially
It is when unmanned vehicle manipulator abuses unmanned vehicle intentionally, lacks cautionary measure, identification measures or prevent violation measure.
For example, unmanned vehicle is possibly used for illegal advertisement, unwarranted attack or invasion of privacy (for example, unwarranted steal
Clap).Provided herein is system and method can monitor use, this can aid in identifies when occur unmanned vehicle it is indiscriminate
With.The data can be also used for the side of being related in judicial tracking abuse or any related data.Such system can also be provided
System and method:User or other entities can be warned when abusing and/or any control of abuse can be supported with override
System.
When operated, unmanned vehicle can be wirelessly transferred or receive data.In some cases, unmanned vehicle may
Radio Resource and/or aeronautical resources are abused, this may cause the waste of public resource.For example, unmanned vehicle may interfere with through
The communication of mandate, or steal bandwidth from other communications.Provided herein is system and method can identify when occur so
Activity, and warning can be provided or prevent such interference from occurring.
In general, there is challenge in the operating aspect in supervision unmanned vehicle.With different types of unmanned vehicle
Different types of use is common in further, traditionally lacks the authoring system for unmanned vehicle flight.Distinguish improper fly
Row and normal flight;Detect small-sized unmanned aircraft;The unmanned vehicle of visual detection night flying;Track and punish anonymous fly
OK;And/or make unmanned vehicle flight with its user or owner in a manner of non-repudiation it is associated be difficult into
Capable.Systems and methods described herein can perform one or more of these targets.Mark data can be collected simultaneously
And one or more identifiers can be authenticated.Although traditionally may be one or more in the following due to lacking
And it is difficult to provide security control:Escape way, directly warning between management and control person and the owner or user of unmanned vehicle
Or aposematic mechanism, the legitimate mechanisms for management and control person's adapter control, the machine for unmanned vehicle differentiation management and control person and hijacker
System and force stop unmanned vehicle unlawful practice measure, but provided herein is system and method these work(can be provided
One or more of can.
Similarly, the needs of the performance for unmanned vehicle, the evaluation of ability and authority or classification mechanism be present.Also deposit
In the evaluation of the operative skill for unmanned vehicle user and record or the needs of checking mechanism.Provided herein is system and side
Method can advantageously provide such evaluation.It is alternatively possible to generate and realize air traffic control according to the evaluation.
As it was previously stated, traditional unmanned vehicle system is without the security mechanism on unmanned vehicle flight safety.
For example, lack the alarm mechanisms of flight safety;Lack the information sharing mechanism of flight environment of vehicle;Or automatic rescue mechanism.It is described
Flight safety system and method can perform one or more of above-mentioned function.
System survey
Fig. 1 show one or more user 110a, 110b, 110c and one or more unmanned vehicle 120a, 120b,
The example of interaction between 120c.User can be handed over by means of remote control 115a, 115b, 115c with unmanned vehicle
Mutually.Verification System can include that the memory storage 130 on the information of user, remote control and/or unmanned vehicle can be stored.
User 110a, 110b, 110c can be the individuals associated with unmanned vehicle.The user can be that nobody flies
The manipulator of row device.The user can be the individual for being authorized to operation unmanned vehicle.The user can provide input with
Control unmanned vehicle.User can provide input to control unmanned vehicle using remote control 115a, 115b, 115c.With
Family can provide the control flight of unmanned vehicle, the operation of payload of unmanned vehicle, payload relative to nobody
The state of aircraft, the operation of one or more sensors of unmanned vehicle, unmanned vehicle communication operation or nobody fly
User's input of other functions of row device.The user can receive data from unmanned vehicle.Use the one of unmanned vehicle
Individual or multiple sensors and the data that obtain are provided to user, be alternatively supplied to user via remote control.User can
To be the owner of unmanned vehicle.The user can be the registration owner of unmanned vehicle.User can be registered as by
Authorized operation unmanned vehicle.The user can be mankind manipulator.The user can be adult or children.The user
The sight that can have when operating unmanned vehicle or can not have to unmanned vehicle.The user can use remote control
Device directly communicates with unmanned vehicle.Or the user can be communicated indirectly with unmanned vehicle by network it is (optional
Ground, use remote control).
User can have the user identifier for identifying the user (for example, ID 1, ID 2, user
ID3……).User identifier can be unique for user.Other users can have the mark different from the user
Symbol.User and other individuals uniquely can be distinguished and/or distinguished by user identifier.Each user can only be allocated single
One user identifier.Or user can register multiple user identifiers.In some cases, sole user's identifier
Sole user can be only distributed to.Or sole user's identifier can be by multiple users to share.In a preferred embodiment,
It can provide and correspond between user and corresponding user identifier.
Alternatively, user can be authenticated to be the authorized user of user identifier.Verification process can include to user's body
The checking of part.The example that verification process is described in further detail in other everywhere in this paper.
Unmanned vehicle 120a, 120b, 120c can be exercisable when being powered.Unmanned vehicle may be at flying
State may be at state of having landed.Unmanned vehicle can use one or more sensor (alternatively, payload
Can be sensor) collect data.Unmanned vehicle can be in response to the control from user (for example, manually by distant
Control device) and operate, independently operation (for example, without user input) or semi-autonomous operate (for example, some users can be included
Input but the aspect independent of user's input can also be included).Unmanned vehicle be able to can respond from remote control 115a,
115b, 115c order.Remote control can be not attached to unmanned vehicle, and the remote control can be from certain distance and the nothing
People's aircraft radio communication.Remote control can receive and/or detect user's input.Unmanned vehicle be able to can follow one group it is pre-
The instruction of programming.In some cases, unmanned vehicle can by response to one or more orders from remote control and
Operate, and otherwise independently operate semi-autonomously.For example, one or more orders from remote control can be according to one or more
Individual parameter and initiate by unmanned vehicle carry out a series of autonomous or semi-autonomous action.Unmanned vehicle can grasped manually
Make, switch between autonomous operation and/or semi-autonomous operation.In some cases, the activity of unmanned vehicle can by one group or
Multigroup air traffic control dominates.
Unmanned vehicle can have one or more sensors.Unmanned vehicle can include one or more visions and pass
Sensor, such as imaging sensor.For example, imaging sensor can be monocular camera, stereo vision camera, radar, sonar or red
Outer camera.Unmanned vehicle can also include the other sensors for being determined for the position of unmanned vehicle, such as global
Alignment system (GPS) sensor, the part that may be used as Inertial Measurement Unit (IMU) or separated inertial sensor
(for example, accelerometer, gyroscope, magnetometer), laser radar, sonac, sonic transducer, WiFI sensors.Sensor
Various examples can include but is not limited to position sensor (for example, global positioning system (GPS) sensor, support position three
The mobile device transmitter of angle), vision sensor be (for example, the imaging of visible ray, infrared light or ultraviolet light can be detected
Device, such as camera), distance or range sensor be (for example, sonac, laser radar, flight time (time-of-
Flight) camera or depth camera), it is inertial sensor (for example, accelerometer, gyroscope, Inertial Measurement Unit (IMU)), high
Sensor, attitude transducer (for example, compass), pressure sensor (for example, barometer), audio sensor are spent (for example, Mike
Wind) or field sensor (for example, magnetometer, electromagnetic sensor).The sensor of any suitable number and combination can be used, such as
One, two, three, four, five or more sensors.
It is alternatively possible to the sensor from different type (for example, two kinds, three kinds, four kinds, five kinds or more types) connects
Receive data.Different types of sensor can measure different types of signal or information (for example, position, direction, speed, acceleration
Degree, distance, pressure etc.) and/or using different types of e measurement technology obtain data.For example, sensor can include
Active sensor (for example, generation and measure the sensor from its respective energy of the energy) and passive sensor (for example,
Detect the sensor of utilisable energy) any suitable combination.In another example some sensors can be generated according to global coordinate system
And the absolute measurement data provided are (for example, the position data provided by GPS sensor, the posture provided by compass or magnetometer
Data), and other sensors can generate the relative measurement data provided according to local coordinate system (for example, being carried by gyroscope
The relative angular speed supplied;The relative translation acceleration provided by accelerometer;The relative attitude information provided by vision sensor;
The relative distance information provided by sonac, laser radar or time-of-flight camera).On unmanned vehicle machine or outside machine
Sensor can collect information, the position of such as unmanned vehicle, the position of other objects, the direction of unmanned vehicle or environment
Information.Single-sensor can in the environment collect a complete group information, or one group of sensor can co-operate
To collect a complete group information in the environment.Navigation that sensor can be used between the mapping of position, position, barrier
Detection or the detection of target.Sensor can be used for the monitoring to environment or main body interested.Sensor can be used for identifying
Target object.Target object can distinguish with the object of other in environment.
The unmanned vehicle can be aircraft.Unmanned vehicle can have can allow the unmanned vehicle in sky
In one or more propulsion units for moving around.One or more propulsion units can enable unmanned vehicle on one
It is individual or multiple, two or more, three or more, four or more, five or more, six or more freely
Degree movement.In some cases, unmanned vehicle can surround one, two, three or more rotation axis and rotate.
Rotation axis may be orthogonal to each other.Rotation axis can keep orthogonal in the whole flight course of unmanned vehicle.Rotation
Shaft axis can include pitch axis, roll axis and/or yaw axes.Unmanned vehicle can be along one or more
Dimension moves.For example, unmanned vehicle be able to can be moved up by the lift generated by one or more rotors.
Under certain situation, unmanned vehicle can (it can be upward relative to the direction of unmanned vehicle along z axis
), X-axis line and/or Y-axis line (it can be horizontal) it is mobile.Unmanned vehicle can be along one, two or three
Axis that can be orthogonal moves.
Unmanned vehicle can be gyroplane.In some cases, unmanned vehicle can may include multiple rotors
More gyroplanes.Multiple rotors can be capable of rotating such that generates lift for unmanned vehicle.Rotor can be propulsion unit,
It can enable unmanned vehicle to move freely in the air.Rotor can be rotated and/or can be given birth to by same speed
Into the lift or thrust of equivalent.Rotor alternatively can be rotated with the speed of change, and this can generate the lift of inequality or push away
Power and/or permission unmanned vehicle rotate.In some cases, can be provided on unmanned vehicle one, two, three
Individual, four, five, six, seven, eight, nine, ten or more rotors.Rotor can be arranged to cause their rotation
Shaft axis are parallel to each other.In some cases, rotor, which can have, is oriented relative to one another to the rotation axis of any angle, and this can be with
Influence the motion of unmanned vehicle.
Shown unmanned vehicle can have multiple rotors.The rotor can be connected to the fuselage of unmanned vehicle,
The fuselage can include control unit, one or more sensors, processor and power supply.Sensor can include visual sensing
Device and/or the other sensors that the information on unmanned vehicle environment can be collected.Information from sensor can be used for
Determine the position of unmanned vehicle.Rotor can be via the one or more arms or extension that can be separated from the core of fuselage
And it is connected to the fuselage.For example, one or more arms can radially extend from the center fuselage of unmanned vehicle, and in institute
State arm end or its nearby can have rotor.In another example, unmanned vehicle can include one or more arms, institute
Stating arm includes one or more additional supporting members, the supporting member can have be attached to thereon one, two, three
Individual or more rotor.For example, the configuration of T-shaped frame can be used for supporting rotor.
By keeping and/or adjusting the output to one or more propulsion units of unmanned vehicle, can control described
The upright position of unmanned vehicle and/or speed.For example, the rotary speed of one or more rotors of increase unmanned vehicle can
To help to make unmanned vehicle increase height or increase height with faster speed.Increase the rotation of one or more of rotors
Rotary speed can increase the thrust of rotor.The rotary speed of one or more rotors of reduction unmanned vehicle, which can aid in, to be made
Unmanned vehicle reduces height or with faster rate reduction height.The rotary speed for reducing one or more of rotors can be with
Reduce the thrust of one or more rotors.When unmanned vehicle takes off, will can be provided to the output of propulsion unit from its
The previous state of landing increase.When unmanned vehicle lands, can be previous from it by the output for being supplied to propulsion unit
State of flight reduces.Unmanned vehicle can be configured to take off and/or land in a substantially vertical fashion.
By keeping and/or adjusting the output of one or more propulsion units to unmanned vehicle, nobody can be controlled
The lateral attitude of aircraft and/or speed.The rotation of the height of unmanned vehicle and one or more rotors of unmanned vehicle
Speed can influence the transverse shifting of unmanned vehicle.For example, unmanned vehicle can favour specific direction with described
Side moves up, and the speed of the rotor of unmanned vehicle can influence the speed and/or motion track of transverse shifting.Can be with
The lateral attitude of unmanned vehicle is controlled by the rotary speed for the one or more rotors for changing or keeping unmanned vehicle
And/or speed.
Unmanned vehicle can have small size.Unmanned vehicle can be carried and/or carried by the mankind.Nobody flies
Row device be able to can be carried by the mankind are singlehanded.
Unmanned vehicle can have full-size no more than 100cm (for example, length, width, height, diagonal, straight
Footpath).In some cases, the full-size can be less than or equal to 1mm, 5mm, 1cm, 3cm, 5cm, 10cm, 12cm,
15cm、20cm、25cm、30cm、35cm、40cm、45cm、50cm、55cm、60cm、65cm、70cm、75cm、80cm、85cm、
90cm、95cm、100cm、110cm、120cm、130cm、140cm、150cm、160cm、170cm、180cm、190cm、200cm、
220cm, 250cm or 300cm.Alternatively, the full-size of unmanned vehicle can be more than or equal to described herein any
Value.Unmanned vehicle can have the full-size between any two value described herein.
Unmanned vehicle can be light-duty.For example, the weight of unmanned vehicle can be less than or equal to 1mg, 5mg,
10mg、50mg、100mg、500mg、1g、2g、3g、5g、7g、10g、12g、15g、20g、25g、30g、35g、40g、45g、50g、
60g、70g、80g、90g、100g、120g、150g、200g、250g、300g、350g、400g、450g、500g、600g、700g、
800g、900g、1kg、1.1kg、1.2kg、1.3kg、1.4kg、1.5kg、1.7kg、2kg、2.2kg、2.5kg、3kg、3.5kg、
4kg、4.5kg、5kg、5.5kg、6kg、6.5kg、7kg、7.5kg、8kg、8.5kg、9kg、9.5kg、10kg、11kg、12kg、
13kg, 14kg, 15kg, 17kg or 20kg.Unmanned vehicle can have the weight more than or equal to any value described herein
Amount.Unmanned vehicle can have the weight between any two value described herein.
Unmanned vehicle can have the unmanned vehicle identifier for identifying the unmanned vehicle (for example, unmanned flight
Device ID1, unmanned vehicle ID2, unmanned vehicle ID3 ...).Unmanned vehicle identifier can be only for unmanned vehicle
One.Other unmanned vehicles can have the identifier different from the unmanned vehicle.Unmanned vehicle identifier can be with
The unmanned vehicle is uniquely distinguished and/or distinguished with other unmanned vehicles.Each unmanned vehicle is only allocated
Single unmanned vehicle identifier.Or can be that single unmanned vehicle registers multiple unmanned vehicle identifiers.At some
In the case of, single unmanned vehicle identifier can be only distributed to single unmanned vehicle.Or single unmanned vehicle mark
Knowing symbol can be shared by multiple unmanned vehicles.In a preferred embodiment, can be in unmanned vehicle and corresponding unmanned flight
There is provided and correspond between device identifier.
Alternatively, unmanned vehicle can be authenticated to be the authorized unmanned vehicle of unmanned vehicle identifier.Authenticated
Journey can include the checking to unmanned vehicle identity.The example that verification process is described in further detail in other everywhere in this paper.
In some embodiments, remote control can have the remote control identification symbol for identifying the remote control.Remote control mark
It can be unique for remote control to know symbol.Other remote controls can have the identifier different from the remote control.Remote control
The remote control uniquely can be distinguished and/or distinguished with other remote controls by identifier.Each remote control can only be divided
With single remote controller identifier.Or can be that single remote controller distributes multiple remote control identification symbols.In some cases, it is single
One remote control identification symbol can be only distributed to single remote controller.Or single remote controller identifier can be shared by multiple remote controls.
In a preferred embodiment, it can provide and correspond between remote control accords with corresponding remote control identification.Remote control mark
Know symbol can with or can not be associated with corresponding user identifier.
Alternatively, remote control can be authenticated to be the authorized remote control of remote control identification symbol.Verification process can include pair
The checking of remote control identity.The example that verification process is described in further detail in other everywhere in this paper.
Remote control can be any kind of device.Described device can be computer (for example, personal computer, above-knee
Type computer, server), mobile device (for example, smart phone, cell phone, tablet PC, personal digital assistant) or appoint
What other kinds of device.Described device can be the network equipment that can be communicated by network.Described device includes one
Or multiple Memory Storage Units, the Memory Storage Unit can include non-transient computer-readable media, it can be stored up
Deposit code, logic or the instruction for performing other described one or more steps everywhere herein.Described device can wrap
Include one or more processors, its can according to the code of non-transient computer-readable media as described herein, logic or
Instruct and either individually or collectively perform one or more steps.Remote control can be held.Remote control can be via any user
Interaction mechanism and receive the input from user.In one example, described device can have touch-screen, and the touch-screen can
To record user's input when user touches screen or slides screen.The user that described device can have any other type hands over
Mutual part, such as button, mouse, control stick, trackball, touch pad, writing pencil, inertial sensor, image capture device, motion
Trap setting or microphone.Described device can sense when described device tilts, and this can influence the operation of unmanned vehicle.
Remote control can be arranged to the single component for performing other each functions of described remote control everywhere herein.Or
Person, can provide remote control as can either individually or collectively perform as herein other remote controls provided everywhere each function
Multiple parts or part.
Verification System can include storing depositing on the memory of the information of user, remote control and/or unmanned vehicle
Storage 130.The memory storage can include one or more Memory Storage Units.One or more of memory storages
Unit can jointly provide or can be distributed on network and/or be distributed at diverse location.In some cases, store
Device storage can be cloud storage system.The memory storage can include storing up stored one or more databases.
Described information can include the identification information on user, remote control and/or unmanned vehicle.For example, the mark
Knowledge can include user identifier (for example, ID 1, ID 2, ID 3 ...) and/or unmanned vehicle identifier
(for example, unmanned vehicle ID1, unmanned vehicle ID2, unmanned vehicle ID3 ...).Equally can alternatively storage of remote control
Identifier.Described information can be stored in long term memory storage, or only can be stored in a short time.Described information can quilt
Receive and buffer.
Fig. 1 shows that each user 110a, 110b, 110c can control corresponding unmanned vehicle 120a, 120b, 120c
Scene.For example, the first user 110a can control the first unmanned vehicle 120a by means of remote control.Second user 110b can
To control the second unmanned vehicle 120b by means of remote control.3rd user 110c can control the 3rd by means of remote control
Unmanned vehicle 120c.User can be away from each other.Or user can operate unmanned vehicle in areal.User
Its corresponding unmanned vehicle can be operated simultaneously, or can operate them in different time.Usage time can be with overlapping.With
Family and unmanned vehicle can individually can identify so that obtain the instruction from each user can only by it is corresponding nobody fly
Row device receives, without being received by other unmanned vehicles.This can be reduced in multiple unmanned vehicles while interference letter when operating
Number possibility.
Each user can control the unmanned vehicle of corresponding user.User can be noted in advance to unmanned vehicle
Volume, to allow only authorized user to control corresponding unmanned vehicle.Unmanned vehicle can be noted in advance
Volume, therefore user can only control authorized unmanned vehicle.Relation between user and unmanned vehicle and/or associate can
To be known.Alternatively, the relation between user and unmanned vehicle and/or associate and can be stored in memory storage 130
In.User identifier can be associated with the unmanned vehicle identifier of corresponding unmanned vehicle.
Memory Storage Unit can track order of the user to unmanned vehicle.Stored order can be with user's
The corresponding unmanned vehicle identifier of corresponding user identifier and/or unmanned vehicle is associated.Alternatively it is also possible to store pair
Answer the identifier of remote control.
The device or the identity of each side being related in the operation of unmanned vehicle can be authenticated.For example, can to
The identity at family is authenticated.User can be verified as the user associated with user identifier.Can be to the body of unmanned vehicle
Part is authenticated.Unmanned vehicle can be verified as the unmanned vehicle associated with unmanned vehicle identifier.Can be with optional
Ground is authenticated to the identity of remote control.Remote control can be verified as the remote control associated with remote control identification symbol.
Fig. 2 shows the example of Verification System according to the embodiment of the present invention.Verification System can be unmanned vehicle
Security system can operate as a part for unmanned vehicle security system.Verification System can provide nobody of raising
Aircraft safety.Verification System can authenticate user, unmanned vehicle, remote control and/or geography fence device.
Verification System can include mark (ID) registration database 210.ID registration databases can be with the phase of authentication center 220
Communication.Verification System can communicate with air traffic control system 230, and the air traffic control system can include flight supervision module 240, flight
Control module 242, traffic administration module 244, user access control module 246 and unmanned vehicle Access Control module 248.
ID registration databases 210 can keep user 250a, 250b, 250c and unmanned vehicle 260a, 260b, 260c's
Identity information.ID registration databases can be that each user and each unmanned vehicle distribute unique identifier (connection 1).Institute
It can user can be uniquely identified out from other users or from other unmanned vehicles to state unique identifier
Uniquely identify out the alpha-numeric string of random generation or the identifier of any other type of unmanned vehicle.It is described unique
Identifier can be generated or can be selected from the list for the possibility identifier for keeping unassigned by ID registration databases.ID is registered
Database can be optionally in geography fence device and/or remote control or unmanned vehicle security system can relate to it is any
Other devices distribute unique identifier.Identifier can be used for recognizing user, unmanned vehicle and/or another device
Card.ID registration databases can be with can not either be handed over one or more users or one or more unmanned vehicles
Mutually.
Authentication center 220 can provide the body to user 250a, 250b, 250c or unmanned vehicle 260a, 260b, 260c
The certification of part.Authentication center can optionally provide is safely to geographical fence apparatus and/or remote control or unmanned vehicle
The certification of the identity for any other device that can relate in system.Authentication center can be obtained from ID registration databases 210 on
The information of user and unmanned vehicle (and/or any other device being related in unmanned vehicle security system) (connection 2).This
Text other provide further detail below on verification process everywhere.
Air traffic control system 230 can interact with authentication center 220.Air traffic control system can from authentication center obtain on
The information of family and unmanned vehicle (and/or any other device being related in unmanned vehicle security system) (connection 4).It is described
Information can include user identifier and unmanned vehicle identifier.Described information can be related to user identity and/or nobody flies
The confirmation of row device identity or mark.Air traffic control system can be management cluster, and the management cluster can include one or more sons
System, such as flight supervision module 240, air traffic control module 242, traffic administration module 244, user access control module 246
With unmanned vehicle Access Control module 248.One or more of subsystems can be used for flight control, air traffic control
System, associated authorization, user and unmanned vehicle access-in management and other functions.
In one example, flight supervision module/subsystem 240 can be used for monitoring unmanned vehicle in assigned spatial domain
Interior flight.Flight supervision module may be configured for detecting when one or more unmanned vehicles deviate predetermined navigation channel.
Flight supervision module can detect when one or more unmanned vehicles perform unwarranted action or do not inputted by user
Action.Flight supervision module can also detect when one or more unwarranted unmanned vehicles enter assigned sky
Domain.Flight supervision module can send warning or warning to unwarranted unmanned vehicle.Can be unwarranted to operating
The remote control of the user of unmanned vehicle provides warning.It can be given a warning with visual manner, audible means or tactile manner.
Flight supervision module can be utilized by the data of one or more sensor collections on unmanned vehicle machine.Flight
Supervision module can utilize the data of one or more sensor collections outside by unmanned vehicle machine.Data can be by that can monitor
Unmanned vehicle or other movable radars, photoelectric sensor or sonic transducer in assigned spatial domain are collected.Data can be by one
At individual or multiple base stations, stop, battery station, geography fence device or network collection.Data can be collected by stationary apparatus.It is static
Device is configured for or can be not configured to be used to interact with unmanned vehicle physics (for example, for nobody flying
Row device recovers energy, receives the delivering from unmanned vehicle or provide repairing for unmanned vehicle).Data can be from wired
Communication or radio communication provide.
Air traffic control system may also include air traffic control module/subsystem 242.Air traffic control module may be configured for generating
With the one or more groups of air traffic control of storage.One group of air traffic control can be based on come control air traffic control.The life of air traffic control
Into can include creating air traffic control from the beginning, or can include selecting one or more groups of flights from multigroup air traffic control
Control.The generation of air traffic control can include the selected multigroup air traffic control of combination.
Unmanned vehicle can operate according to the air traffic control of one or more groups of applications.Air traffic control can with control nobody
Any aspect of the operation of aircraft is (for example, flight, sensor, communication, payload, navigation, electricity use, entrained thing
Product).For example, air traffic control may indicate that unmanned vehicle can wherein fly or cannot wherein fly.Tof tube
System may indicate that when unmanned vehicle can cannot fly in given area or in given area.Air traffic control can be with
Indicate when data can be by one or more sensor collections, transmission and/or the records on unmanned vehicle machine.Air traffic control can
To indicate when payload can be exercisable.For example, payload can be image capture device, and air traffic control can
With indicate described image trap setting can when and where catch image, transmission image and/or storage image.Tof tube
System, which may indicate that how communication can occur, (it is, for example, possible to use channel or method) or can occur what type of logical
Letter.
Air traffic control module can include one or more databases of the storage on the information of air traffic control.For example, institute
One or more positions that the flight of unmanned vehicle is limited can be stored by stating one or more databases.Air traffic control module can
To store multigroup air traffic control for polytype unmanned vehicle, and multigroup air traffic control can be with specific nothing
People's aircraft is associated.Access the one group flight associated with the particular type unmanned vehicle in polytype unmanned vehicle
Control can be possible.
One or more flight plans of unmanned vehicle can be ratified or be refused to air traffic control module.In certain situation
Under, the flight plan for including the proposed flight path for unmanned vehicle can be assigned.Can on unmanned vehicle and/or
Environment and flight path is provided.Flight path can be limit completely (define along path a little), half limit
(for example, one or more way points can be included, but the path for reaching the way point can be variable) or less limit
Fixed (for example, final destination or other specification can be included, but the path for reaching the final destination can not limited
).Air traffic control module can receive flight plan and can ratify or refuse flight plan.If flight plan is with being directed to
One group of air traffic control of unmanned vehicle contradicts, then air traffic control module can refuse the flight plan.Tof tube molding
Block can suggest the modification to flight plan, and the modification can make the flight plan observe one group of air traffic control.Fly
Row control module can be that unmanned vehicle generates or suggested one group of flight plan that can observe one group of air traffic control.User
One or more parameters or target that can be with input pin to unmanned vehicle task, and air traffic control module can be generated or suggested
One group of flight plan that can meet one or more of parameters while in accordance with one group of air traffic control.For nobody
The parameter of aircraft task or the example of target can include destination, one or more way points, timing demands (for example, total
Body time restriction, the time that be in some opening positions), maximal rate, peak acceleration, the data type to be collected, to catch
Image type, any other parameter or the target caught.
Traffic administration module/subsystem 244 can be provided for air traffic control system.Traffic administration module may be configured for from
User receives the request to resource.The example of resource can include but is not limited to Radio Resource (for example, bandwidth, to communicator
Access), position or space (for example, position or space for flight plan), the time (for example, for flight plan when
Between), the access to base station, the access to bus stop, the access to battery station, to delivering point or pickup point access or it is any its
The resource of his type.Traffic administration module may be configured for responding the request and planning the flight for unmanned vehicle
Navigation channel.Flight Path can utilize assigned resource.Traffic administration module may be configured for plan and be directed to unmanned flight
The task of device, it can alternatively include Flight Path and any sensor or other devices on the unmanned vehicle machine
Operation.The task can utilize any assigned resource.
Traffic administration module can be configured to adjust task based on the condition detected in the spatial domain assigned.Example
Such as, traffic administration module can adjust predetermined flight path based on the condition detected.Adjusting flight path can include adjusting
The way point for the flight path that whole predetermined flight path, adjustment half limit or the destination for adjusting flight path.Examined
The condition measured can include weather, can changing with the change in spatial domain, accident, the foundation of geography fence device or air traffic control
Become.Traffic administration module can inform adjustment of the user to task, such as adjustment to flight path.
User 250a, 250b, 250c can be the individuals associated with unmanned vehicle 260a, 260b, 260c, such as grasp
Make the individual of unmanned vehicle.Other examples for describing user and unmanned vehicle everywhere herein.Can user with it is corresponding
Unmanned vehicle between communication channel is provided, the communication channel can be used for the operation (connection 3) for controlling unmanned vehicle.
The flight of control unmanned vehicle can be included or such as other described nothings everywhere herein by controlling the operation of unmanned vehicle
Any other part of people's aircraft.
Communication channel (connection 5) can be provided between unmanned vehicle and air traffic control system, because air traffic control system can be marked
Knowledge condition, on the condition user and/or adapter unmanned vehicle is warned to improve the condition.When user and/or nothing
When people's aircraft undergoes verification process, communication channel can also contribute to authentication.Alternatively, communication channel can be established
Between air traffic control system and the remote control of user, and some similar features can be provided.Including geography fence device
In system, communication channel can be provided between geography fence device, for identify/certification and/or condition identity, warning and/
Or adapter.
Communication channel (connection 6) can be provided between user and air traffic control system because air traffic control system can with identification condition,
User and/or adapter unmanned vehicle is warned to improve the condition on the condition.When user and/or unmanned vehicle
When undergoing verification process, communication channel can also contribute to authentication.
Alternatively, connection 1 can be logic channel.Connection 2 and connection 4 can be network connections.For example, connect 2 and connect
Connect 4 can by LAN (LAN), wide area network (WAN) (such as internet), communication network, data network, cellular network or appoint
What other kinds of network provides.Connection 2 and connection 4 can pass through indirect communication (for example, the indirect communication for passing through network)
To provide.Or they can be provided by direct access communication channel.Connection 3, connection 5 and connection 6 can be via remote control
Or earth station and the network connection, the mobile access network connection that provide, or the connection of any other type.They can be via
Indirect communication channel or direct access communication channel provide.
Authorized third party's (air traffic control system, geo-fencing system etc.) can be according to its unmanned vehicle identifier
(ID) corresponding unmanned vehicle is identified by authentication center, and obtain relevant information (configuration of such as unmanned vehicle,
Its ability rating and safe class).Security system can handle different types of unmanned vehicle.It is different types of nobody
Aircraft can have different physical characteristics (for example, model, shape, size, engine power, distance, battery life, sensing
Device, performance, payload, payload grading or ability) or can be used for performing different tasks (for example, monitoring, taking the photograph
Picture, communication, delivering).Different types of unmanned vehicle can have different safe class or priority.For example, inhomogeneity
The unmanned vehicle of type, which can be authorized to, performs different activities.For example, the unmanned vehicle with the first authorization type can quilt
Authorize and enter the area that the unmanned vehicle with the second authorization type can not be authorized to entrance.Unmanned vehicle type can wrap
Include by same manufacturer or designer or the different unmanned vehicle types created by different manufacturers or designer.
Authorized third party's (air traffic control system, geo-fencing system etc.) can pass through according to user identifier (ID)
Authentication center identifies corresponding user, and obtains relevant information.Security system can handle different types of user.
Different types of user can have different levels of skill, experience amount, with the associating of different types of unmanned vehicle, authorize
Grade or different demographic informations.For example, the user with different levels of skill can be considered as different types of user.
User can undergo proof or test to verify user skill level.One or more other users can confirm or verify described
The level of skill of user.For example, the director of user can verify the level of skill of the user.User can be from rower
Know the level of skill of the user.User with different experience levels can be considered as different types of user.For example, user
Log recording can be used or prove specific, operation unmanned vehicle hourage or being flown using unmanned vehicle for task
Number.The experience level of the user can be verified or confirmed to other users.The user can be from the warp of user described in line identifier
The amount of testing.User type can indicate that the level of training of user.The level of skill and/or experience of user can for unmanned vehicle
To be general.Or the level of skill and/or experience of user can be specific for unmanned vehicle type.For example, user
Can have the high professional qualification level or rich experiences amount to the unmanned vehicle of the first kind, and to the unmanned flight of Second Type
Utensil has low level of skill or not very rich experience.Different types of different user can be included with different authorization types
User.Different authorization types, which may mean that, can apply one group of different air traffic control to different users.In certain situation
Under, some users can have the safe class higher than other users, this may mean that the user can be done it is less
Air traffic control or limitation.In some cases, common user can be different from management user, and the management user can
Control is taken over from common user.Common user can be different from controlled entity user (for example, the member of government organs, emergent
The member of service, such as law enforcement agency).In some embodiments, it can be controlled entity user Huo Keyi areas to manage user
Not in controlled entity user.In another example, parent can take over flight control from the child of the parent, or refer to
The person of leading can take over flight control from student.User type can indicate that the one or more type unmanned vehicles of operation
User classification or species.Other users type information can be based on user's demographic statistics (for example, address, age
Deng).
Similarly, any other device being related in security system or each side can have the type of their own.For example, ground
Reason fence identifier can indicate that geography fence type of device, or remote control identification symbol can indicate that remote unit type.
The unmanned vehicle operated in security system can be assigned unmanned vehicle ID and key.The ID and key
It can be distributed from ID registration databases.The ID and key can be globally unique and can not alternatively be replicated.Pacifying
The user of operation unmanned vehicle can be assigned ID and key in total system.The ID and key can register number from ID
Distributed according to storehouse.The ID and key can be globally unique and can not alternatively be replicated.
Unmanned vehicle and air traffic control system can have the mutual authentication using ID and key, so as to allow to operate the nothing
People's aircraft.In some cases, certification can include obtaining the license flown in confined area.User and air traffic control system can
With the mutual authentication with use ID and key, so as to allow user to operate the unmanned vehicle.
Key can provide in a variety of manners.In some embodiments, the key of unmanned vehicle can be can not be with
Unmanned vehicle is separated.Can be by key designs into preventing the key from stealing.Key can be by write-once and can not
The memory (for example, encryption chip) or the universal subscriber identity module by solidifying (USIM) that outside is read are realized.At some
In the case of, user key or remote control key can not be separated with the remote control of the user.Key can be by certification
Center to unmanned vehicle, user and/or any other device using to be authenticated.
Verification System as herein provided can include:Identity registry database, it is relative that it is configured for storage
In the one or more unmanned vehicle identifiers for uniquely identifying out unmanned vehicle each other and relative to each other and only
One ground identifies one or more user identifiers of user;Authentication center, it is configured for the body to unmanned vehicle
The identity of part and user are authenticated;And air traffic control system, it is configured for receiving nobody of authenticated unmanned vehicle
The user identifier of aircraft identifier and authenticated user entities, and flown based at least one in the following to provide one group
Row control:Certified unmanned vehicle identifier and certified user identifier.
Using as known in the art or later developed any hardware configuration or it can set to realize Verification System.Example
Such as, ID registration databases, authentication center and/or blank pipe can either individually or collectively be operated using one or more servers
System.One or more subsystems of air traffic control system can be either individually or collectively realized using one or more servers,
Such as flight supervision module, air traffic control module, traffic administration module, user access control module, unmanned vehicle access control
Molding block or any other module.Any description to server goes for the device of any other type.Described device
Can be computer (for example, personal computer, laptop computer, server), mobile device (for example, smart phone, honeycomb
Phone, tablet PC, personal digital assistant) or any other type device.Described device can pass through network
And the network equipment to communicate.Described device includes one or more Memory Storage Units, and the Memory Storage Unit can be with
Including non-transient computer-readable media, it can be stored for performing other described one or more steps everywhere herein
Code, logic or instruction.Described device can include one or more processors, and the processor can be according to such as this paper institutes
Code, logic or the instruction of the non-transient computer-readable media of description and either individually or collectively perform one or more steps
Suddenly.
Each part can be realized at same position or at diverse location on hardware, such as ID is registered
Database, authentication center and/or air traffic control system.Verification System composition portion can be realized using same device or multiple devices
Point.In some cases, it is possible to achieve cloud computing architecture is to provide Verification System.Alternatively, Verification System can utilize
Reciprocity (P2P) relation.
The part can be provided in outside unmanned vehicle machine, on unmanned vehicle machine or in some combinations.Institute
Part is stated to can be provided in outside remote control machine, on remote control machine or in some combinations.In some preferred embodiments,
The part can be provided in that unmanned vehicle machine is outer or remote control machine outside, and can with unmanned vehicle (and/or its
His unmanned vehicle) and remote control (and/or other remote controls) communicate.The part can be direct with unmanned vehicle
Communication or indirect communication.In some cases, the communication can relay via another device.Another device can be distant
Control device or another unmanned vehicle.
Air traffic control
The activity of unmanned vehicle can be dominated according to one group of air traffic control.One group of air traffic control can include one or
Multiple air traffic control.This document describes all kinds of air traffic control and example.
Air traffic control can dominate the physical layout of unmanned vehicle.For example, air traffic control can dominate unmanned vehicle
Flight, unmanned vehicle take off and/or the landing of unmanned vehicle.Air traffic control can indicate that unmanned vehicle can be with
The surface region or unmanned vehicle that can not either fly above it above it can wherein fly or can be with
The spatial volume not flown wherein.Air traffic control can be related to the position of unmanned vehicle (for example, unmanned vehicle is in space
In or underlying surface above position) and/or unmanned vehicle direction.In some instances, air traffic control can prevent
Unmanned vehicle is in the volume (for example, spatial domain) assigned and/or in the area (for example, lower section ground or water surface) assigned
Fly top.Air traffic control can include the one or more borders for not allowing unmanned vehicle flight in it.Show at other
In example, air traffic control can only allow unmanned vehicle to be flown in the volume assigned and/or above the area assigned.Fly
Row control can include the one or more borders for allowing unmanned vehicle flight in it.Alternatively, air traffic control can be to prevent
Only unmanned vehicle limit in height on fly, the upper height limit can be fixed or variable.In another case,
Air traffic control can prevent unmanned vehicle from being flown under height lower limit, and the height lower limit can be fixed or variable
's.Unmanned vehicle can be required to fly in the height between height lower limit and upper height limit.In another example, nobody flies
Row device may not fly in one or more altitude ranges.For example, air traffic control can only allow in a certain scope
Unmanned vehicle direction, or the unmanned vehicle direction in a certain scope may not be allowed.The scope of unmanned vehicle direction
Can be on one, two or three axis.The axis can be quadrature-axis, such as yaw axes, pitch axis or
Roll axis.
Air traffic control can dominate the movement of unmanned vehicle.For example, air traffic control can dominate the flat of unmanned vehicle
Speed, the translational acceleration of unmanned vehicle, the angular speed of unmanned vehicle are moved (for example, on one, two or three axis
Angular speed) or unmanned vehicle angular acceleration (for example, angular acceleration on one, two or three axis).Fly
Row control can be unmanned vehicle point-to-point speed, unmanned vehicle translational acceleration, unmanned vehicle angular speed or nobody fly
The maximum limitation of row device set angular acceleration.Therefore, one group of air traffic control can include the flight speed of limitation unmanned vehicle
Degree and/or Flight Acceleration.Air traffic control can be unmanned vehicle point-to-point speed, unmanned vehicle translational acceleration, nobody
Vehicle rate or unmanned vehicle set angular acceleration minimum threshold.Air traffic control can require unmanned vehicle in minimum
Moved between threshold value and maximum limitation.Or air traffic control can prevent unmanned vehicle in one or more point-to-point speed models
Enclose, moved in the range of translational acceleration scope, angular velocity range or angular acceleration.In one example, unmanned vehicle may
It is not allowed to hover in the spatial domain of appointment.The unmanned vehicle can be required to fly more than 0mph minimum point-to-point speed
OK.In another example, unmanned vehicle may be not allowed to fly too fast (for example, the maximal rate limitation in 40mph is following
Flight).The movement of unmanned vehicle can be dominated on the volume assigned and/or above the area assigned.
Air traffic control can dominate unmanned vehicle take off and/or descent.For example, unmanned vehicle can be allowed
Flown in the area assigned, without dropping in the area.In another example, unmanned vehicle can only can be with
Certain mode is taken off with a certain speed from the area assigned.In another example, may not allow in the area assigned
Take off or land manually, and Autonomous landing or take-off process must be used.Air traffic control can dominate whether permission to take off, whether
Allow to land, take off or land any regular (for example, speed, acceleration, direction, direction, the offline mode) having to comply with.
In some embodiments, the automation order for being only allowed for taking off and/or land without allowing manual landing or taking off, or
Vice versa by person.Can be dominated on the volume assigned and/or above the area assigned unmanned vehicle take off and/
Or descent.
In some cases, air traffic control can dominate the operation of the payload of unmanned vehicle.Unmanned vehicle
Payload can be sensor, emitter or any other object that can be carried by unmanned vehicle.Payload can be with
It is powered or powers off.Payload can be shown as exercisable (for example, energization) or inoperable (for example, power-off).Flight
Control can include the condition for not allowing unmanned vehicle operation payload.For example, in the spatial domain assigned, air traffic control
It can require that payload powers off.Payload can send signal and air traffic control can be with the property of dominant signal, signal
Amplitude, the scope of signal, the direction of signal or any operator scheme.For example, if payload were light source, air traffic control
The light that may be required in assigned spatial domain is brighter unlike threshold value light intensity.In another example, if payload is to be used for
The loudspeaker of sound is sent, then air traffic control can require that the loudspeaker does not transmit any noise outside the spatial domain assigned.
Payload can collect the sensor of information, and air traffic control can dominate the pattern of information of collecting, on how pre-
The pattern of processing or processing information, what resolution ratio information is collected with, information is collected with what frequency or sampling rate, from what
Scale collection information collects information from what direction.For example, payload can be image capture device.Picture catching fills
Still image (for example, rest image) or dynamic image (for example, video) can be caught by putting.Air traffic control can be with dominating figure
Zoom, the resolution ratio of the image caught by image capture device, the sampling rate of image capture device, image as trap setting
The shutter speed of trap setting, the aperture of image capture device, whether using flash of light, image capture device pattern (for example, according to
Bright pattern, color mode, static and video mode) or image capture device focus.In one example, camera may not be by
Permission catches image on the area assigned.In another example, camera can be allowed to the seizure figure on the area assigned
As but can not catch sound.In another example, it is high-resolution can be only permitted the seizure in the area assigned for camera
Photo and in the outer shooting low resolution picture in area assigned.In another example, payload can be audio capture dress
Put.Whether air traffic control can dominate allows audio capture device energization, the sensitivity of audio capture device, audio capture device
Decibel range, the directionality (for example, directionality for parabola microphone) of audio capture device or the audio that can be picked up
Any other quality of trap setting.In one example, audio capture device can be allowed to or may be not allowed in institute
Sound is caught in the area of assignment.In another example, audio capture device can be only permitted to catch in the area assigned
Sound in particular frequency range.Payload can be dominated on the volume assigned and/or above the area assigned
Operation.
Air traffic control can dominate information can be transmitted or stored to payload whether.For example, if payload is figure
As trap setting, then whether air traffic control be able to can be recorded with dominating figure picture (static or dynamic).Air traffic control can prop up
Figure seems in the memory on the no machine carried memory that may be recorded in image capture device or unmanned vehicle machine.For example,
Image capture device can be allowed to be powered and captured image is shown in local display, but its record cannot be allowed
Any image.Air traffic control can seem no can flow out outside image capture device or outside unmanned vehicle with dominating figure.Example
Such as, air traffic control may indicate that when unmanned vehicle is located in assigned spatial domain, the picture catching dress on unmanned vehicle
Putting can be allowed to flowing downwardly to video into the terminal outside unmanned vehicle machine, and when unmanned vehicle be located at assigned spatial domain it
When outer, described image trap setting can not flow downward out video.Similarly, if payload is audio capture dress
Put, then air traffic control can dominate the machine carried memory or unmanned vehicle whether sound may be recorded in audio capture device
In memory on machine.For example, audio capture device can be allowed to be powered and captured sound is played back on local loudspeaker
Sound, but it cannot be allowed to record any sound.Air traffic control can seem with dominating figure it is no can flow out audio capture device it
Outside outer or any other payload.It can be received on the volume assigned and/or dominated above the area assigned
The storage and/or transmission of the data collected.
In some cases, payload can be the article carried by unmanned vehicle, and air traffic control can refer to
The characteristic of bright payload.The example of payload characteristic can include the size of payload (for example, height, width, length
Degree, diameter, diagonal), the weight of payload, the stability of payload, the material of payload, payload it is frangible
The type of property or payload.For example, air traffic control may indicate that unmanned vehicle flies same above the area assigned
When can carry parcel no more than 3lbs.In another example, air traffic control can allow unmanned vehicle only being assigned
Volume in carry the parcel with more than 1 foot of size.Another air traffic control can allow unmanned vehicle carrying
1lb is flown 5 minutes only in the volume assigned during bigger parcel, and if unmanned vehicle in 5 minutes not yet
Assigned volume is left, then the unmanned vehicle can be made to land automatically.It can provide to payload own type
Limitation.For example, unstable or potential explosive payload possibly can not be carried by unmanned vehicle.Flight restriction can prevent
Frangible object is carried by unmanned vehicle.Control can have on the volume assigned and/or above the area assigned
Imitate the characteristic of load.
Air traffic control can also indicate the activity that can be performed on the article carried by unmanned vehicle.For example, flight
Whether control may indicate that can drop article in the area assigned.Similarly, whether can with for air traffic control if may indicate that
Article is picked up from the area assigned.Unmanned vehicle can have mechanical arm or can help to drop or pick up article
Other mechanical structures.Unmanned vehicle can have the carrying cabin that can allow unmanned vehicle belongings.Can be on dividing
The volume of group and/or the area assigned and control is related to the activity of payload.
Payload can be dominated relative to the positioning of unmanned vehicle by air traffic control.Payload flies relative to nobody
The position of row device can be adjustable.Payload is relative relative to the translation position of unmanned vehicle and/or payload
In the direction of unmanned vehicle can be adjustable.Translation position can be can on one, two or three quadrature-axis
Adjustment.The direction of payload can be (for example, pitch axis, yaw axes on one, two or three quadrature-axis
Or roll axis) adjustable.In some embodiments, payload can be connected to the unmanned vehicle with carrier,
The carrier can control positioning of the payload relative to unmanned vehicle.Carrier can support effectively on unmanned vehicle
The weight of load.Carrier can allow payload relative to unmanned vehicle and on one, two or three
The head of individual axis rotation.One or more rack units and one that the adjustment to payload positioning can be achieved can be provided
Individual or multiple actuators.Air traffic control can with control vector or it is any adjustment payload relative to unmanned vehicle position
Other mechanisms.In one example, when flight is above the area assigned, air traffic control can be not allow for imitating load
Direction downwards.For example, the area can have the sensitive data that may do not expect that payload is caught.In another example
In, when in the spatial domain assigned, air traffic control can be such that payload is moved down relative to unmanned vehicle translation,
This can allow the broader visual field, such as panoramic image capture.Can be on the volume assigned and/or in the area assigned
Top dominates the positioning of payload.
Air traffic control can dominate the operation of one or more sensors of unmanned vehicle.For example, air traffic control can be with
Dominate and whether open or close sensor (or which sensor opened or closed), the pattern of collection information, on how pre-
The pattern of processing or processing information, what resolution ratio information is collected with, information is collected with what frequency or sampling rate, from what
Scale collection information collects information from what direction.Air traffic control can dominate whether sensor can store or transmit letter
Breath.In one example, when unmanned vehicle is located in assigned volume, GPS sensor can be closed, while open and regard
Feel that sensor or inertial sensor are used for navigation purpose.In another example, can be with when flight is above the area assigned
Close the audio sensor of unmanned vehicle.One can be dominated on the volume assigned and/or above the area assigned
The operation of individual or multiple sensors.
The communication of unmanned vehicle can be controlled according to one or more groups of air traffic control.For example, unmanned vehicle can be with
Telecommunication can be carried out with one or more remote-control devices.The example of remote-control device can include controllable unmanned vehicle and grasp
The remote control of work, payload, carrier, sensor or unmanned vehicle any other part, can show by unmanned vehicle
The display terminal of the information received, the database for collecting the information from unmanned vehicle or any other outside dress
Put.Telecommunication can be radio communication.The communication can be the direct communication between unmanned vehicle and remote-control device.Directly
WiFi, WiMax, radio frequency, infrared, vision or other kinds of direct communication can be included by connecting the example of letter.The communication can
To be the indirect communication between unmanned vehicle and remote-control device, the remote-control device can include one or more middle devices
Or network.The example of indirect communication can include 3G, 4G, LTE, satellite or other kinds of communication.Air traffic control may indicate that
Whether telecommunication is opened or closed.Air traffic control can include not allowing unmanned vehicle under one or more radio conditions
The condition of communication.For example, when unmanned vehicle is in assigned spatial domain volume, can not allow to communicate.Air traffic control can be with
Indicate the communication pattern that can be allowed to or can be not allowed to.For example, air traffic control may indicate that whether allow direct communication pattern,
Whether allow indirect communication pattern or whether between direct communication pattern and indirect communication pattern set up preference.Show at one
In example, interior of the volume assigned allows direct communication.In another example, above the area assigned, as long as directly logical
Letter is available, it is possible to and the preference to direct communication is set up, otherwise can use indirect communication, and outside the area assigned,
Any communication is not allowed.Air traffic control may indicate that the characteristic of communication, bandwidth such as used, frequency used, agreement used, used
Encryption, the device of workable subsidiary communications.For example, when unmanned vehicle is located in predetermined volume, air traffic control only may be used
Allow to communicate using existing network.Air traffic control can dominate unmanned vehicle on the volume assigned and/or divide
Communication on the area of group.
Other functions of unmanned vehicle can be dominated according to air traffic control, such as navigation, electricity are used and monitored.Electricity
The residual non-uniformity amount based on battery and electricity use information, the electric charge shape of battery can be included by measuring the example for using and monitoring
The surplus of state or estimated distance based on battery and electricity use information.Assigned for example, air traffic control may be required in
Volume in the unmanned vehicle of operation there is remaining power life-span of at least 3 hours.In another example, air traffic control can be with
It is required that unmanned vehicle when outside the area assigned with least 50% state of charge.Can be on being assigned
Volume and/or such additional function is dominated by air traffic control above the area assigned.
The volume assigned and/or the area assigned can be static for one group of air traffic control.For example, for institute
The volume of assignment and/or the regional border assigned can remain identical for one group of air traffic control.Or institute
Stating border can change over time.For example, the area assigned can be school, and the regional side for being assigned
Boundary can include the school during the class period.After classes are over, the area that the border can reduce or be assigned can be moved
Remove.In a period of after classes are over, it can be participated in child and create an area assigned near after school activity at park.Close
In the volume assigned and/or the regional rule assigned for one group of air traffic control can remain it is identical or
It can change over time.Change can be by a certain in some day sometime, in one week in one day, one month
Week, month, season, season, the factor of time or any other time correlation indicate.(it can be carried information from clock
For in one day sometime, the related information of date or other times) can be used for the change of realizing border or rule.One group
Air traffic control can have is dynamically composed part in response to the other factors in addition to the time.The example of other factors can wrap
Include presence, environment complexity, the physics traffic of weather, temperature, detected illumination level, detected individual or machine
Flow (for example, the land magnitude of traffic flow, pedestrian traffic flow, aircraft traffic flow), wireless or network traffic flow, detected
Noise level, detected movement, detected temperature mark or any other factor arrived.
The volume assigned and/or the area assigned can with or can not be associated with geography fence device.Ground
Reason fence apparatus can be for assigned volume and/or the regional reference point assigned.Such as this paper, other are described everywhere,
Can the position based on geography fence device and assigned volume and/or the regional position assigned are provided.Or can be with
Assigned volume and/or area are provided in the presence of without geography fence device.For example, enclosed without actual geographic
In the case that column device is in airport, the known coordinate on airport can be provided and be used as assigned volume and/or
The regional reference assigned.Assigned volume and/or any combinations in area, some of which, which can be provided, to be relied on
In geography fence device, some of which can be independent of described device.
Air traffic control can cause any kind of flight responsive measures of unmanned vehicle.For example, unmanned vehicle can
To bear away.Unmanned vehicle can be from manual mode automatically into autonomous or semi-autonomous flight control mode, or can be with
It is not responding to certain user's input.Unmanned vehicle can allow another user to take over the control unmanned vehicle.Unmanned flight
Device can land or take off automatically.Unmanned vehicle can send to user and alert.Unmanned vehicle can with automatic retarding or add
Speed.Unmanned vehicle can adjust payload, carrier, sensor, communication unit, navigation elements, the behaviour of power adjustment unit
Make (it can include hang up or change its operating parameter).Flight responsive measures can occur immediately, or can be
(for example, 1 minute, 3 minutes, 5 minutes, 10 minutes, 15 minutes, 30 minutes) occurs afterwards for a period of time.The period can be
For the grace period of user, with react and practise before flight responsive measures come into effect to unmanned vehicle some
Control.For example, if user is close to flight restricted area, user can be cautioned and can change the boat of unmanned vehicle
Road is to leave the flight restricted area.If the user does not respond within the grace period, unmanned vehicle can be automatic
Drop in flight restricted area.Unmanned vehicle can be according to operated by from long-distance user the one or more of remote control fly
Line command and normal operating.When one group of air traffic control and one or more of flight orders conflict, flight response is arranged
Applying can be with the one or more of flight orders of override.For example, if user command unmanned vehicle enters no-fly zone, nobody
Aircraft can change navigation channel automatically to avoid the no-fly zone.
One group of air traffic control can include on one or more information in the following:(1) being assigned,
Volume and/or the area of one group of air traffic control can be applied above it, (2) one or more rules are (for example, unmanned flight
The operation of device, payload, carrier, sensor, communication module, navigation elements, power cell), (3) follow unmanned vehicle
Regular one or more flight responsive measures are (for example, unmanned vehicle, payload, carrier, sensor, communication mould
The response of block, navigation elements, power cell), or (4) can influence assigned volume and/or area, described regular or described
The time of flight responsive measures or any other factor.One group of air traffic control can include single air traffic control, and it can be wrapped
Include the information on (1), (2), (3) and/or (4).One group of air traffic control can include multiple air traffic control, and it can each be wrapped
Include the information on (1), (2), (3) and/or (4).Any kind of air traffic control can be combined, and can be according to tof tube
Make and any combination of flight responsive measures occur.One group of air traffic control can be directed to and one or more bodies assigned are provided
Product and/or area.For example, unmanned vehicle can be directed to and one group of air traffic control is provided, wherein one group of air traffic control is not
Allow unmanned vehicle flown in the first volume assigned, it is allowed to unmanned vehicle limit in height it is following, assigned
The second volume in flight but do not allow operate unmanned vehicle machine on camera, and only allow unmanned vehicle assigned
Third volume in recording audio evidence.Unmanned vehicle, which can have, can make the unmanned vehicle observe flying for air traffic control
Row responsive measures.Can be with override unmanned vehicle manually operated so that the unmanned vehicle observes the rule of air traffic control.
Being manually entered with override user can occur automatically for one or more flight responsive measures.
Unmanned vehicle can be directed to and generate one group of air traffic control.The generation of one group of air traffic control can include from
Head starts to create air traffic control.The generation of one group of air traffic control can include selecting one from available multigroup air traffic control
Group air traffic control.The generation of one group of air traffic control can include the feature for combining one or more groups of air traffic control.For example, one
The generation of group air traffic control can include determining that element, such as to determine that the volume assigned and/or area, determination one or more
Rule, determine that one or more flight responsive measures and/or determination can make any element for any of dynamic element
Factor.These elements can from the beginning be generated or can selected from one or more pre-existing element options.
Under certain situation, air traffic control can be manually selected by user.Or it can be selected automatically by means of one or more processors
Air traffic control is selected, without user intervention.In some cases, some users input, but one or more processing can be provided
Device can cause the final determination of air traffic control to be inputted in accordance with the user.
Fig. 3 shows to may participate in the example of one or more factors of the generation of one group of air traffic control.For example, user profile
310th, unmanned vehicle information 320 and/or geography fence device information 330 can participate in the generation of one group of air traffic control 340.
Under certain situation, during one group of air traffic control is generated, only consider user profile, only consider unmanned vehicle letter
Breath, only consider geography fence information, only consider remote information or consider any number or any combinations of these factors.
It is contemplated that additive factor during one group of air traffic control is generated.These factors can be included on this
The information of ground environment (for example, environment complexity, city and rural area, traffic flow information, climatic information), from one or more
The information in third party source (for example, government sources, such as FAA), the information of time correlation, the preference of user's input or it is any its
His factor.
In some embodiments, one group on specific landform (for example, the volume assigned, the area assigned) flies
Row control can be identical, and with user profile, unmanned vehicle information, geography fence device information or any other information
It is unrelated.For example, all users can receive one group of air traffic control of identical.In another case, all unmanned vehicles can be with
Receive one group of air traffic control of identical.
Or can be with base on one group of air traffic control of specific landform (for example, the volume assigned, the area assigned)
It is different in user profile, unmanned vehicle information and/or geography fence device information.User profile can be included specific to list
The information record of flight (for example, user's flying history, previous user) of individual user and/or can include as herein other
Described user type (for example, the users ' skillses classification, user experience classification) everywhere.Unmanned vehicle information can include specific
In the information (for example, unmanned vehicle flying history, the recording of maintenance or accident, unique sequence number) of single unmanned vehicle
And/or can include as herein other everywhere described unmanned vehicle type (for example, unmanned vehicle model, spy
Property).
One group of air traffic control can be generated based on the user identifier for indicating user type.One kind can be provided to be used for
The system for controlling unmanned vehicle (UAV).The system can include:First communication module;One or more processors, it can
It is operatively coupled to the first communication module and is either individually or collectively configured for:Use the described first communication mould
Block or second communication module indicate the user identifier of user type to receive;Generate and be directed to based on the user identifier
One group of air traffic control of the unmanned vehicle;And using the first communication module or the second communication module come to institute
State unmanned vehicle and transmit one group of air traffic control.
One kind is used to control the method for unmanned vehicle (UAV) to include:Receive the user's mark for indicating user type
Know symbol;By means of one or more processors, one group for the unmanned vehicle is generated based on the user identifier
Air traffic control;And by means of communication module, one group of air traffic control is transmitted to the unmanned vehicle.Similarly, can be with
A kind of non-transient computer-readable media for the programmed instruction for including and being used to control unmanned vehicle (UAV), the calculating are provided
Machine computer-readable recording medium includes:For receiving the programmed instruction for the user identifier for indicating user type;For based on the user
Identifier and the programmed instruction for generating one group of air traffic control for the unmanned vehicle;And for generate signal with by
The programmed instruction of one group of air traffic control is transmitted to the unmanned vehicle in communication module.
A kind of unmanned vehicle can include:One or more propulsion units, it realizes the flight of the unmanned vehicle;
Communication module, it is configured for receiving one or more flight orders from long-distance user;And flight control units,
It is configured for the flight control signal that generation delivers to one or more of propulsion units, wherein the flight control
Signal is generated according to one group of air traffic control for the unmanned vehicle, wherein the air traffic control is based on instruction
Go out the user identifier of the user type of the long-distance user and generate.
User type can have such as other described any characteristics everywhere herein.For example, user type can indicate that
Experience level, the level of training or proof of the user for operating unmanned vehicle for operating the user of unmanned vehicle, or operation
The class of subscriber of the unmanned vehicle of one or more types.User identifier can uniquely identify out institute from other users
State user.User identifier can be from the remote control away from the unmanned vehicle.
Based on user identifier, by selecting one group of air traffic control to generate described one group from multigroup air traffic control
Air traffic control.One group of air traffic control is generated by the air traffic control system outside unmanned vehicle machine.Unmanned vehicle can be via straight
Connect communication channel and communicated with the air traffic control system.Unmanned vehicle can be by via operated by user or the user
Remote control then communicates in carrying out with the air traffic control system.Unmanned vehicle can by via it is one or more other nobody
Aircraft then communicates in carrying out with the air traffic control system.
One group of air traffic control can be generated based on the unmanned vehicle identifier for indicating unmanned vehicle type.Can be with
System for controlling unmanned vehicle (UAV) is provided.The system can include:First communication module;At one or more
Device is managed, it is operably coupled to the first communication module and is either individually or collectively configured for:Using described
First communication module or second communication module indicate the unmanned vehicle identifier of unmanned vehicle type to receive;Based on institute
State unmanned vehicle identifier, one group air traffic control of the generation for the unmanned vehicle;And communicated using described first
Module or second communication module transmit one group of air traffic control to the unmanned vehicle.
In some embodiments, it is a kind of to be used to control the method for unmanned vehicle (UAV) to include:Reception indicates
The unmanned vehicle identifier of unmanned vehicle type;By means of one or more processors, based on the unmanned vehicle mark
Know symbol and generate one group of air traffic control for the unmanned vehicle;And by means of communication module, to the unmanned flight
Device transmits one group of air traffic control.Similarly, a kind of non-wink for including the programmed instruction for being used to control unmanned vehicle (UAV)
State computer-readable medium can include:For receiving the program for the unmanned vehicle identifier for indicating unmanned vehicle type
Instruction;For generating the program of one group of air traffic control for the unmanned vehicle based on the unmanned vehicle identifier
Instruction;And for generating signal to transmit one group of air traffic control to the unmanned vehicle by means of communication module
Programmed instruction.
A kind of unmanned vehicle (UAV) can be provided, including:One or more propulsion units, it realizes unmanned vehicle
Flight;Communication module, it is configured for receiving one or more flight orders from long-distance user;And flight control
Unit processed, it is configured for the flight control signal that generation delivers to one or more of propulsion units, wherein described
Flight control signal is generated according to one group of air traffic control for the unmanned vehicle, wherein the air traffic control is
Unmanned vehicle identifier based on the unmanned vehicle type for indicating the long-distance user and generate.
Unmanned vehicle type can have such as other described any characteristics everywhere herein.For example, unmanned vehicle class
Type can indicate that the payload of the model of unmanned vehicle, the performance of unmanned vehicle or unmanned vehicle.Unmanned flight
Device identifier can uniquely identify out the unmanned vehicle from other unmanned vehicles.User identifier can be from remote
The remote control of the unmanned vehicle.
It can be based on comprising one or more factor additive factors (such as herein other everywhere described those factors)
And generate one group of air traffic control.Such as, it may be considered that environmental condition.For example, if environment complexity is high, can provide more
Limitation, and if environment complexity is low, then more less limitation can be provided.If the density of population is high, more limit can be provided
System, and if the density of population is low, then less limitation can be provided.If there is higher magnitude of traffic flow degree (for example, aerial hand over
Through-current capacity or the magnitude of traffic flow based on surface), then more limitation can be provided, and if there is relatively low magnitude of traffic flow degree,
Less limitation can be then provided.In some embodiments, compared to amblent air temperature with temperature preferably, with less
Wind, without precipitation or with little or no lightning possibility, if amblent air temperature there is extreme temperature, have wind including
The possibility of precipitation or lightning, then it can provide more limitations.
Based on unmanned vehicle identifier, by selecting one group of air traffic control from multigroup air traffic control to generate
State one group of air traffic control.One group of air traffic control is generated by the air traffic control system outside unmanned vehicle machine.Unmanned vehicle can be with
Communicated via direct access communication channel with the air traffic control system.Unmanned vehicle can be by via user or user institute
The remote control of operation then communicates in carrying out with the air traffic control system.Unmanned vehicle can by via it is one or more its
His unmanned vehicle then communicates in carrying out with the air traffic control system.
As it was noted above, various types of air traffic control can be provided in one group of air traffic control.Air traffic control can be special
Due to unmanned vehicle or user or without specific to unmanned vehicle and/or user.
Fig. 7 shows the diagram of the scene comprising polytype air traffic control.Various areas can be provided.Border can be provided
To limit the area.One group of air traffic control can influence one or more areas (for example, the spatial domain of two-dimensional surface area top
Or spatial domain volume).One group of air traffic control can include the one or more rule associated with one or more areas.
In one example, flight control area 710 can be provided, communication regulatory area 720 can be provided, and can provide
Payload regulatory area 730.Payload and communication regulatory area 750, and non-regulatory area 760 can be provided.The area can be with
Border with any shape or size.For example, area can have a regular shape, such as circular, oval, avette, square,
Rectangle, any kind of quadrangle, triangle, pentagon, hexagon, octagon, bar shaped, shaped form etc..Area can have not
Regular shape, it can include convex or spill part.
Flight control area 710 can apply the layout on unmanned vehicle or the one or more rule of movement.Flight
Regulatory area can apply the flight responsive measures for the flight that can influence unmanned vehicle.For example, when in flight control area,
Unmanned vehicle can only can fly at the height between height lower limit and upper height limit, and not applied outside flight control area
Add flight restriction.
Payload regulatory area 720 can apply the operation of the payload on unmanned vehicle or one of positioning or
Multiple rules.Payload regulatory area can apply the flight responsive measures for the payload that can influence unmanned vehicle.For example,
When in payload regulatory area, unmanned vehicle can not catch figure using image capture device payload
Picture, and do not apply effective load limitation outside payload regulatory area.
Communication regulatory area 730 can apply the one or more rule of the operation of the communication unit on unmanned vehicle.
Communication regulatory area can exert one's influence unmanned vehicle communication unit operation flight responsive measures.For example, when positioned at logical
When believing in regulatory area, unmanned vehicle may not transmit captured data, but can be allowed to receive flight control letter
Number, and do not apply communication limitation outside communication regulatory area.
Payload and communication regulatory area 750 can apply the payload and unmanned vehicle on unmanned vehicle
The one or more rule of operation/positioning of communication unit.For example, when in payload and communication regulatory area, nobody
Aircraft may not store the image captured by the image capture device payload on unmanned vehicle machine, and
Image may not be flow to or be transmitted to outside unmanned vehicle machine, and do not apply outside payload and communication area of control
Such limitation.
One or more non-regulatory areas can be provided.Non- regulatory area can be outside one or more borders, or can be
In one or more borders.When within non-regulatory area, user can ring that need not automatically initiate one or more flights
Retain the control to unmanned vehicle in the case of answering measure.User can in the physical limit of unmanned vehicle freely
Operate the unmanned vehicle.
One or more of described area can be with overlapping.For example, flight control area can be with the control area overlapping 715 that communicates.
In another example communication regulatory area can be with payload control area overlapping 725.In another example flight control area can be with payload
Control area overlapping 735.In some cases, flight control area, communication regulatory area and payload regulatory area can be overlapping
740。
When multiple area overlappings, the rule from multiple areas can be held in place.For example, flight restriction and communication limitation are equal
It can be held in place in overlay region.In some cases, as long as the rule from multiple areas does not conflict with one another, their cans
It is held in place.
If conflict be present between the rule, various rule responses can be applied.Most limited for example, can apply
Property one group rule.For example, if the firstth area requires that unmanned vehicle flies below 400 feet of height, and the secondth area will
Ask unmanned vehicle to be flown below 200 feet of height, then in overlay region, can apply in 200 feet of height
The rule flown below.This can include being mixed and matched one group of rule to form most restricted one group.If for example,
One area requires that unmanned vehicle flies more than 100 feet and below 400 feet, and the secondth area requires that unmanned vehicle exists
More than 50 feet and flown below 200 feet, then when unmanned vehicle be located in overlay region, it can use and come from the
The flight lower limit in one area and the flight upper limit from the secondth area, so as to be flown between 100 feet and 200 feet.
In another case, rank can be provided for the area.The rule in the area higher from rank can be dominant, and
No matter whether it has more or less limitations for the rule from the relatively low area of rank.Can be according to control
Type indicates the rank.For example, the air traffic control of unmanned vehicle position can be than the higher grade for the control that communicates, it is described
Communicating control can be than the higher grade of payload control.In other cases, about whether not allowing unmanned vehicle to exist
The rule flown in given zone can surpass other control for the area.It can be pre-selected or pre-enter rank.
Under certain situation, there is provided can indicate which area is higher than other areas in rank for the user of one group of rule in the area.
For example, the firstth area can require that unmanned vehicle flies below 400 feet and payload must shut off.Secondth area can be with
It is required that unmanned vehicle flies below 200 feet and limited without payload.If the rank in the firstth area is higher,
The rule from the firstth area can be applied, without applying any rule from the secondth area.For example, unmanned vehicle can be
Less than 400 feet are flown and close payload.If the rank in the secondth area is higher, can apply from the secondth area
Rule, without applying any rule from the firstth area.For example, unmanned vehicle can fly and not below 200 feet
Limited with any payload.
As it was noted above, when unmanned vehicle is in an area, one group of air traffic control can be to the unmanned flight
Device applies different types of rule.This can include constraining payload use, Huo Zheji based on the position of unmanned vehicle
Radio communication is constrained in the position of unmanned vehicle.
The aspect of the present invention can be related to a kind of unmanned vehicle payload control system, including:First communication module;
And one or more processors, it is operably coupled to first module and is either individually or collectively configured to use
In:Indicate that the payload for relying on position uses parameter using the first communication module or second communication module to receive
Signal;And one or more unmanned vehicles that the payload realizes payload operation using parameter are observed in generation
Operation signal.
A kind of to be used to constrain the method that the payload of unmanned vehicle uses, methods described includes:Reception indicate according to
The payload of position is relied to use the signal of parameter;And by means of one or more processors, the effectively load is observed in generation
Lotus realizes one or more unmanned vehicle operation signals of payload operation using parameter.Similarly, one can be provided
Kind includes the non-transient computer-readable media of the programmed instruction used for constraining the payload of unmanned vehicle, the meter
Calculation machine computer-readable recording medium includes:Programmed instruction of the payload for relying on position using the signal of parameter is indicated for receiving;With
And realize one or more unmanned vehicles behaviour of payload operation using parameter in accordance with the payload for generating
Make the programmed instruction of signal.
According to the embodiment of the system, unmanned vehicle can include:Payload;Communication module, it is configured to
For receiving one or more payload orders from long-distance user;And flight control units, it is configured for
Generation is delivered to the payload control signal of the carrier of the payload or the support payload, wherein described have
Effect load control signal generates according to one or more unmanned vehicle operation signals, wherein the unmanned vehicle is grasped
It is to be generated based on the payload for relying on position using parameter as signal.
The payload that payload can limit one or more pre-positions using parameter uses.Such as institute above
State, payload can be image capture device, and payload can limit described image trap setting one using parameter
The operation of individual or multiple pre-positions.Payload may be limited to one or more pre-positions using parameter and use figure
One or more images are recorded as trap setting.Payload may be limited to one or more pre-positions using parameter
One or more images are transmitted using image capture device.In other embodiments, payload can be audio capture
Device, and payload limits operation of the audio capture device in one or more pre-positions using parameter.
Alternatively or in combination, payload can allow the payload of one or more pre-positions using parameter
Use.When payload is image capture device, payload using parameter image capture device can be allowed at one or
The operation of multiple pre-positions.Payload can allow to catch using image in one or more pre-positions using parameter
Device is caught to record one or more images.Payload can allow to use in one or more pre-positions using parameter
Image capture device transmits one or more images.Payload can be audio capture device, and payload uses ginseng
Number can allow operation of the audio capture device in one or more pre-positions.
One or more processors can also be either individually or collectively configured for:Use the first communication module
Or second communication module receives the signal for the position for indicating unmanned vehicle;And by the position of unmanned vehicle and dependence
The payload of position is compared using parameter, and determines whether unmanned vehicle operates positioned at limitation or permission payload
Opening position.The position can be flight restricted area.Flight restricted area can be determined by control person.Flight restricted area can be
Away from airport, public gathering, government property, army's property, school, private residence, power plant or any be designated as flying
In the preset distance in other regions of restricted area.The position can remain static, or can change over time
Become.
The signal for indicating that the payload for relying on position uses parameter can be received from controlled entity.Controlled entity is pipe
Person, international organization or company processed or the controlled entity such as other described any other types everywhere herein.Controlled entity
Can be the global institution, such as other described any mechanism and tissues everywhere herein.Controlled entity can be unmanned flight
Source outside device machine or on machine.Controlled entity can be the certification outside air traffic control system or unmanned vehicle machine outside unmanned vehicle machine
Any other part of system.Controlled entity can be database, and the database is stored in the memory of unmanned vehicle
Or it can be stored in outside unmanned vehicle machine.Database can be configured to renewable.Controlled entity can be transmitting device,
Its opening position that can be positioned at limitation or allow payload to operate.In some cases, controlled entity can be as herein
Other described geography fence devices everywhere.In some cases, can be based on the user for indicating the unmanned vehicle
User identifier and/or indicate the unmanned vehicle identifier of the unmanned vehicle type to send signal.
One aspect of the present invention can be related to a kind of unmanned vehicle communication control system, including:First communication module;
And one or more processors, it is operably coupled to first communication module and is either individually or collectively configured to use
In:Using the first communication module or second communication module letter of the communication for relying on position using parameter is indicated to receive
Number;And generation observe the operation for communicating and unmanned vehicle communication unit being realized using parameter it is one or more nobody
Aircraft operation signal.
Further it is provided that it is used for the method for constraining the radio communication of unmanned vehicle, including:Reception, which indicates, relies on position
Communication using parameter signal;And by means of one or more processors, generation reality in accordance with described communicate using parameter
One or more unmanned vehicle operation signals of the operation of existing communication unit.Similarly, a kind of include can be provided to be used for about
The non-transient computer-readable media of the programmed instruction of the radio communication of beam unmanned vehicle (UAV), computer-readable Jie
Matter includes:Programmed instruction of the communication for relying on position using the signal of parameter is indicated for receiving;And observed for generating
The programmed instruction of one or more unmanned vehicle operation signals of the operation that communication unit is realized using parameter that communicates.
The additional aspect of the present invention can include a kind of unmanned vehicle, and the unmanned vehicle includes:Communication unit, its
It is configured for receiving or transmitting radio communication;And flight control units, its be configured for generation be delivered to it is logical
Believe unit to realize the communications control signal of the operation of the communication unit, wherein the communications control signal be according to one or
Multiple unmanned vehicle operation signals and generate, wherein the unmanned vehicle operation signal be based on rely on position communication
Generated using parameter.
The radio communication that communication can limit one or more pre-positions using parameter uses.Radio communication can be
Direct communication.Radio communication can include radio communication, WiFi communication, bluetooth (Bluetooth) communication or infrared communication.Wirelessly
Communication can be indirect communication.Radio communication can include 3G, 4G or LTE communication.Can be by not allowing any radio communication
Used to limit the communication.Can be by only allowing the radio communication in selected frequency band to be used using to limit the communication.
By only when radio communication, which uses, does not disturb higher priority to communicate the radio communication can be allowed to use, it is described to limit
Communication uses.In some cases, every other pre-existing radio communication can communicate with higher than unmanned vehicle
Priority.For example, if unmanned vehicle nearby flies, the various radio communications nearby occurred can be considered to have higher
Priority.In some cases, certain form of communication can be considered to have the communication of higher priority --- for example, emergent
Communication for service, government or official's communication, medical treatment device or communication for service etc..Alternatively or in combination, the communication uses parameter
The radio communication of one or more pre-positions can be allowed to use.For example, indirect communication can be allowed in designated area,
Without allowing direct communication.
One or more processors can be also either individually or collectively configured for:Using the first communication module or
Second communication module receives the signal for the position for indicating unmanned vehicle;And by the position of unmanned vehicle with relying on position
Whether the communication put is compared using parameter and determines unmanned vehicle positioned at the position of limitation or the operation for allowing communication unit
Put place.The position can be communication restricted area.The restricted area that communicates can determine by control person or by individual.Flight restricted area can
With away from private residence, airport, public gathering, government property, army's property, school, power plant or any be designated
In preset distance for other regions of flight restricted area.The position can remain static, or can be pushed away with the time
Move and change.
The position can depend on existing radio communication in area.For example, if the operation of communication unit can be disturbed
One or more existing radio communications in given area, then the area, which can be identified as to communicate, is limited area.In accordance with logical
The operation of the unmanned vehicle communication unit of courier's parameter can reduce electromagnetic interference or audio disturbances.If for example,
Electronic equipment around use, then some operations of unmanned vehicle communication unit may interfere with them, for example, disturbing theirs
Wireless signal.In accordance with communication interference can be reduced or eliminated using the operation of the unmanned vehicle communication unit of parameter.For example, nothing
Operation of people's aircraft communication unit in limited frequency band can not disturb ambient electron device to operate or communicate.In another situation
Under, in area the operation of unmanned vehicle communication unit stop to prevent from disturbing the operation of ambient electron device or communication.
It can be received from controlled entity and indicate signal of the communication for relying on position using parameter.Controlled entity is control
Person, international organization or company, or the controlled entity such as other described any other types everywhere herein.Controlled entity can
To be the global institution, such as other described any mechanism and tissues everywhere herein.Controlled entity can be unmanned vehicle
Source outside machine or on machine.Controlled entity can be the certification system outside air traffic control system or unmanned vehicle machine outside unmanned vehicle machine
Any other part of system.Controlled entity can be database, and the database can be stored in the memory of unmanned vehicle
In, or can be stored in outside unmanned vehicle machine.Database can be configured to renewable.Controlled entity can be transmission dress
Put, its opening position for being positioned at limitation or allowing payload to operate.In some cases, controlled entity can be as herein its
His described geography fence device everywhere.In some cases, can be based on the user's for indicating the unmanned vehicle
User identifier and/or the unmanned vehicle identifier of the unmanned vehicle type is indicated to send signal.
Mark module
Unmanned vehicle can include the one or more propulsion units that can promote the unmanned vehicle.In some feelings
Under condition, propulsion unit can include rotor assemblies, and the rotor assemblies can include the rotation for driving one or more rotor blades
The one or more motors turned.Unmanned vehicle can be the more rotor unmanned aircrafts that may include multiple rotor assemblies.Rotor
Blade can provide propulsive force, such as lift to unmanned vehicle when rotated.Each rotor blade of unmanned vehicle can
Rotated with identical speed or with friction speed.The operation of rotor blade can be used for the flight for controlling unmanned vehicle.Rotor
The operation of blade can be used for controlling taking off and/or landing for unmanned vehicle.The operation of rotor blade can be used for controlling nothing
People's aircraft is motor-driven in spatial domain.
Unmanned vehicle can include flight control units.Flight control units can generate the behaviour of controllable rotor assemblies
One or more signals of work.Flight control units can generate the one of the operation of one or more motors of control rotor assemblies
Individual or multiple signals, the operation can transfer to influence the rotary speed of rotor blade.Flight control units can be received and come from
The data of one or more sensors.Data from sensor can be used for generation and the one or more of rotor assemblies flown
Control signal.The example of sensor can include but is not limited to GPS unit, inertial sensor, vision sensor, ultrasonic sensing
Device, heat sensor, magnetometer or other kinds of sensor.Flight control units can receive the data from communication unit.
Data from communication unit can include the order from user.The order can be inputted via remote control, and it can be by
Transmit to unmanned vehicle.Data from communication unit and/or sensor can include detection to geographical fence apparatus or
Person is transferred from the information of geography fence device.Data from communication unit can be used for generating one or more to rotor assemblies
Individual flight control signal.
In some embodiments, flight control units can control other functions of unmanned vehicle, with replacement or attached
It is added on flight.Flight control units can control the operation of the payload on unmanned vehicle machine.For example, payload can be with
It is image capture device, and flight control units can control the operation of image capture device.Flight control units can control
The positioning of payload on unmanned vehicle machine.For example, carrier can support payload, such as image capture device.Fly
Row control unit can control the positioning of payload with the operation of control vector.Flight control units can control unmanned flight
The operation of one or more sensors on device machine.This can include other described any sensors everywhere herein.Flight
Control unit can control the communication of unmanned vehicle, the navigation of unmanned vehicle, the electricity of unmanned vehicle uses or nobody
Any other function on aircraft machine.
Fig. 4 shows the example of the flight control units according to embodiment of the present invention.Flight control modules 400 can include
Mark module 410, one or more processors 420 and one or more communication modules 430.In some embodiments, nothing
The flight control modules of people's aircraft can be circuit board, and the circuit board can include one or more chips, such as one
Or multiple identification chips, one or more processors chip and/or one or more communication chips.
Mark module 410 can be unique for unmanned vehicle.Mark module can be from other unmanned flights
Device uniquely identifies and distinguished the unmanned vehicle.Identity module can include unmanned vehicle identifier and unmanned flight
The key of device.
The unmanned vehicle identifier being stored in mark module can not be changed.The unmanned vehicle identifier can be with
Not modifiable state is stored in the mark module.Mark module can be hardware component, and the hardware component can be with
User's change is prevented for the mode of unique unmanned vehicle identifier of the unmanned vehicle to store the unique mark
Symbol.
Unmanned vehicle key may be configured for providing the authentication verification to unmanned vehicle.Unmanned vehicle key
Can be unique for unmanned vehicle.Unmanned vehicle key can be alpha-numeric string, the alpha-numeric string for
Unmanned vehicle can be unique and can be stored in mark module.Unmanned vehicle key can generate at random.
Unmanned vehicle identifier and unmanned vehicle key can be used in combination, to recognize the unmanned vehicle
Demonstrate,prove and allow the operation of the unmanned vehicle.Can be using authentication center come to unmanned vehicle identifier and unmanned vehicle
Key is authenticated.Authentication center can be outside unmanned vehicle machine.Authentication center can be as other are described everywhere herein
Verification System a part (for example, authentication center 220 in Fig. 2).
Unmanned vehicle identifier and unmanned vehicle key can be by other described ID log-on datas everywhere herein
Issue in storehouse (for example, ID Registering modules 210 in Fig. 2).ID registration databases can be outside unmanned vehicle machine.Mark module can
It is configured for receiving unmanned vehicle identifier and unmanned vehicle key once, and after being initially received no longer more
Change.Therefore, unmanned vehicle identifier and unmanned vehicle key once have determined, you can are not modifiable.At other
In the case of, unmanned vehicle identifier and key can be fixed after receipt, and can not again be written into.Or nobody
Aircraft identifier and unmanned vehicle key can only be changed by authorized party.The conventional manipulator of unmanned vehicle can not
Unmanned vehicle identifier and unmanned vehicle key in mark module is enough altered or modified.
In some cases, ID registration databases can voluntarily issue mark module, and the mark module can be fabricated onto
In unmanned vehicle.ID registration databases can issue identifier before or while the manufacture of unmanned vehicle.ID registers number
Identifier can be issued before unmanned vehicle is sold by or is distributed according to storehouse.
Mark module can be realized as USIM.Mark module can be write-once type memory.Mark module can
Outside can not alternatively read.
Mark module 410 can not can separate with flight control units 400.Mark module can not damage flight
Removed in the case of the function of control unit from the remainder of flight control units.Single-handedly mark module can not be controlled from flight
The remainder of unit processed removes.Individual manually cannot remove mark module from flight control units.
Unmanned vehicle can include flight control units, and it is configured for the operation for controlling unmanned vehicle;With
And mark module, it is integrated into the flight control units, wherein the mark module from other unmanned vehicles only
One ground identifies the unmanned vehicle.A kind of method for identifying unmanned vehicle can be provided, methods described includes:Using winged
Row control unit controls the operation of unmanned vehicle;And come using the mark module being integrated in the flight control units
The unmanned vehicle is uniquely identified out from other unmanned vehicles.
Mark module with physical associations or can be attached to flight control units.It is single that mark module can be integrated to flight control
In member.For example, mark module can be welded onto the chip on the circuit board of flight control units.Various physics skills can be used
Art, to prevent mark module from being separated from the remainder of flight control units.
System in package (SIP) technology can be used.For example, multiple functional chips (including processor, communication module and/
Or mark module) can integrate in a package, so as to perform complete function.If splitting mark module, encapsulate
In other modules will be destroyed, so as to cause unmanned vehicle unavailable.
Fig. 5 shows the additional example of the flight control units 500 according to embodiment of the present invention.Illustrate and utilize SIP skills
The possible configuration of art.Mark module 510 and processor 520 can be encapsulated in same chip.Mark module can not be with processing
Device separates, and any trial to removing mark module will cause the removal or infringement of processor, and this will cause to fly
The infringement of control unit.Mark module can be integrated in same core together with one or more miscellaneous parts of flight control units
In one encapsulation of piece.In other examples, mark module can be encapsulated in same chip with communication module 530.At some
In the case of, mark module, processor and communication module can be encapsulated in a chip.
Chip on board (COB) can be used to encapsulate.Bare chip can be adhered to interconnection with conductive or nonconductive adhesive
Substrate.Then line lead bonding can be entered to realize its electrical connection, also referred to as Soft Roll seals.Mark module can be soldered to flight
On the circuit board of control unit.After COB encapsulation, mark module is once soldered on circuit boards, just cannot be complete
Take out on ground.Trial to physical removal mark module will cause the damage of the other parts to circuit board or flight control units
Evil.
It can ensure that mark module can not be with the remainder point of the flight control units of unmanned vehicle using software
Open.For example, each unmanned vehicle can realize software version corresponding with its mark module.In other words, in software version
There may be between mark module and correspond.Software version can be unique for unmanned vehicle or substantially only
One.The normal operation of software may need to obtain the unmanned vehicle key being stored in mark module.Not corresponding
In the case of unmanned vehicle key, software version may not be run.If change removes mark module, unmanned vehicle
Software be not normally functioning.
In some embodiments, mark module can be issued by controlled entity.Controlled entity can exercise a setting
The power of formula is used for any entity for the power for identifying unmanned vehicle or exercising unmanned vehicle certain forms.In some feelings
Under condition, controlled entity can be government organs or the manipulator by government authorization.Government can be national government, state/provincial government,
Municipal government or any type of local government.Controlled entity can be government organs, such as US Federal Aviation Administration (FAA), U.S.
Federal Trade Commission of state (FTC), FCC (FCC), American National telecommunications and Information Management Bureau (NTIA),
Department of Transportation (DoT) or U.S. Department of Defense (DoD).Controlled entity can be control person.Controlled entity can be country or state
Border is organized or company.Controlled entity can be manufacturer or the dealer of unmanned vehicle of unmanned vehicle.
Fig. 6 shows the flight control units of the mark of chip on the tracking flight control units according to embodiment of the present invention
Example.Flight control units 600 can have mark module 610 and other one or more chips (for example, chip 1 620,
Chip 2 630 ...).Mark module can have unique unmanned vehicle identifier 612, chip record 614 and one or
Multiple processors 616.
Mark module 610 can not be separated with the remainder of flight control units 600.Or mark module
It is able to can be removed from flight control units.Mark module can by unique unmanned vehicle identifier 612 and from other
The unmanned vehicle is uniquely identified out in unmanned vehicle.
Mark module can include chip record 614, and the chip record can store one or more periphery chips
620th, 630 record.The example of other chips can include one or more process chips, communication chip or any other type
Chip.Chip record can store any kind of data on one or more periphery chips, such as periphery chip
Type (for example, model), the information on chip manufacturer, the sequence number of chip, performance characteristics of chip or on chip
Any other data.It is described record can be for certain chip it is unique, the type for chip can be it is unique, with
And/or person can be included for chip or chip type not necessarily unique parameter.Chip record can be memory cell.
When unmanned vehicle starts, mark module can start self-test, and this can collect the information on periphery chip
And the information collected is compared with the information being stored in chip record.The one or more processors 616 of mark module
It can be used for performing the comparison.Mark module can check whether periphery chip and its internal chip record are consistent, so as to
Differentiate whether the mark module is transplanted.For example, if the information being currently collected into during self-test records with initial chip
Match, then mark module is not transplanted probably.If the information being currently collected into during self-check program not with initially
Chip record matches, then mark module has probably been transplanted.It can be provided to user or another device to whether
The possibility transplanted the instruction of mark module or transplanted.For example, when initial chip record not with periphery core during self-test
During piece information match, warning can be sent to user's set or to controlled entity.
In some embodiments, chip record information can not change.Chip record information can be write-once type
Memory.Chip record can include for the first time open unmanned vehicle when be collected into, on periphery one or more chip
Information.Information on periphery chip can be hard wired in chip record.Information on periphery chip can be by
Manufacturer provides and can be built in chip record.In some cases, chip record outside can not can be read.
In the alternative, chip record information can change., can more new chip when occurring self-check program
Record information.For example, the information on periphery chip may be substituted for or supplement the existing record on periphery chip.Can be with
In initial chip record compared between the chip information collected during self-test.If being not detected by change, mould is identified
Block is probably not yet transplanted.If detecting change, mark module has probably been transplanted.Similarly, Ke Yiti
For to whether the instruction transplanted.
For example, initial chip can include the record for showing two periphery chips, one of chip is Serial No.
ABCD123 model X, and another is Serial No. DCBA321 model Y.Self-check program can occur.In the self-check program phase
Between, the information on periphery chip can be collected, described information can show two chips, and one of them is Serial No.
12345FG model X, and another is Serial No. HIJK987 model S.Because data mismatch, therefore mark can be provided
Know the relatively high likelihood that module has been transplanted.Originally will chip record in records series number be 12345FG model X and sequence
Row number is that HIJK987 model S initial marking module may be removed.Initial marking module can be by being derived from different nothings
The new logo module substitution of people's aircraft, wherein the chip that the flight control units of the different unmanned vehicle have is sequence
Row number is ABCD123 model X and Serial No. DCBA321 model Y.Initial chip record can be included to flying from nobody
The original manufacturer of row device or initial configuration or prior operation, unmanned vehicle periphery chip from unmanned vehicle
Record.In any case, difference can indicate that for from after initial manufacture or initial configuration or from after prior operation
Unmanned vehicle for, mark module has been transplanted.
It is, therefore, possible to provide a kind of unmanned vehicle, including:Flight control units, it is configured for controlling nobody
The operation of aircraft, wherein the flight control units include mark module and chip, wherein the mark module is configured to
The unmanned vehicle is uniquely identified out from other unmanned vehicles for (1), (2) form the initial note of the chip
The information on the chip is collected in record, and (3) after the original records of the chip are formed, wherein the mark module
Be configured for undergoing self-check program, the self-check program by collect information on the chip and the chip just
Beginning record is compared, and wherein described mark module is configured for when collecting information and institute on the chip
State chip original records it is inconsistent when warning is provided.
A kind of method for identifying unmanned vehicle can include:The behaviour of unmanned vehicle is controlled using flight control units
Make, wherein the flight control units include mark module and chip;Using the mark module come from other unmanned vehicles
In uniquely identify out the unmanned vehicle, wherein the mark module forms the original records of the chip;Forming institute
State the information collected after the original records of chip on the chip;Using the mark module, will collect on chip
Information compared with the original records of the chip, so as to undergo self-check program;And when it is described collect on chip
Information and the chip original records it is inconsistent when warning is provided.
Chip record can be the integral part of mark module.Chip record can be can not be with its remaining part of mark module
Divide separated.In some cases, chip record can not damage the remainder of mark module and/or flight control units
In the case of from the mark module remove.
Self-test can occur automatically in the case of no any user's input.When unmanned vehicle is powered, self-test journey
Sequence can be with automatic start.For example, once unmanned vehicle is opened, self-check program can be carried out.When unmanned vehicle starts to fly
During row, self-check program can be with automatic start.When unmanned vehicle powers off, self-check program can be with automatic start.In unmanned flight
During the operation of device, self-check program can regular automatic start (for example, with rule or irregular time interval automatic start).
It may also respond to the event that detects or inputted in response to user and self-check program occurs.
In some embodiments, during mark module is issued, Verification System can be related to.Verification System can be with
Issue physical marking module or the data that may be provided in mark module.During mark module is issued, it can be related to
ID Registering modules and/or authentication center.During Verification System is realized, controlling organization can be related to.Issuing mark mould
During block, controlled entity can be related to.Controlled entity can be specific government organs or the manipulator by government authorization,
Or the controlled entity such as other described any other types everywhere herein.
In order to prevent unmanned vehicle by refitted vehicles (for example, with new mark module or new identifier), certification
System (for example, authentication center) can require to inspect periodically unmanned vehicle.Once unmanned vehicle is qualified and does not examine
Measure and distort, verification process can continues.Verification process can uniquely identify out unmanned vehicle and confirm the nothing
People's aircraft is the actual unmanned vehicle identified by identifier.
Mark for operation
The user of unmanned vehicle can be uniquely identified.The use can be uniquely identified by means of user identifier
Family.User identifier can uniquely identify out the user and the user can be made to be different from other users.User can
To be the manipulator of unmanned vehicle.User can be the individual for controlling unmanned vehicle.User can control unmanned vehicle
Flight, control unmanned vehicle payload operation and/or placement, control unmanned vehicle communication, control nobody fly
One or more sensors of row device, the navigation for controlling unmanned vehicle, the electricity of unmanned vehicle is controlled to use or control
Any other function of unmanned vehicle.
Unmanned vehicle can be uniquely identified.It can be flown by means of unmanned vehicle identifier to uniquely identify nobody
Row device.Unmanned vehicle identifier can uniquely identify out the unmanned vehicle and can make the unmanned vehicle area
Not in other unmanned vehicles.
In some cases, user can be authorized to operation unmanned vehicle.One or more individual consumers can operate
It may need to be identified before unmanned vehicle.In some cases, all users can be authorized to operation nothing when identified
People's aircraft.Alternatively, one group of only selected user can be authorized to operation unmanned vehicle when identified.Some users can
It can be not authorized to operate unmanned vehicle.
Fig. 8 shows to consider whether the user is authorized to operation nothing before allowing user to operate unmanned vehicle
The process of people's aircraft.The process can include receiving user identifier 810 and receive unmanned vehicle identifier 820.Can
To make the determination whether user is authorized to operation unmanned vehicle 830.If the uncommitted operation unmanned flight of user
Device, then the user is not allowed to operate unmanned vehicle 840.If the user is authorized to operation unmanned vehicle, allow
The user operates unmanned vehicle 850.
User identifier 810 can be received.Can be from remote control user identifier.It can input to receive from user and use
Family identifier.User can be based on to input and pull user identifier from memory.Can be alternatively to remote control or another
Device provides user's input.During user identifier is provided, user can log in or undergo any authentication procedure.User
User identifier can be manually entered.User identifier can store on a user device.User identifier can be in memory
Middle storage, user identifier is manually entered without user.
Unmanned vehicle identifier 820 can be received.User identifier can be received from unmanned vehicle.Can be from user
Input receives unmanned vehicle identifier.User can be based on to input and pull unmanned vehicle identifier from memory.Can
Alternatively to provide user's input to remote control or another device.During unmanned vehicle identifier is provided, Yong Huke
To undergo verification process.Or unmanned vehicle can undergo tagging or Self-certified program automatically.Unmanned vehicle identifier
It can be stored on unmanned vehicle or user's set.Unmanned vehicle identifier can store in memory, without with
Family is manually entered unmanned vehicle identifier.Unmanned vehicle identifier can be stored in the mark module of unmanned vehicle.
For unmanned vehicle unmanned vehicle identifier can be optionally it is not modifiable.
Unmanned vehicle can broadcast unmanned vehicle identifier during operation.Broadcast unmanned vehicle mark can be continued
Know symbol.Or the unmanned vehicle identifier can be broadcasted according to request.Can be according to outside the unmanned vehicle machine
Air traffic control system, the Verification System outside unmanned vehicle machine or any other device request and broadcast unmanned vehicle mark
Symbol.When the communication between unmanned vehicle and air traffic control system may be encrypted or during certification, unmanned vehicle mark can be broadcasted
Symbol.In some cases, unmanned vehicle identifier can be broadcasted in response to event.For example, when unmanned vehicle is opened,
Can be with Auto broadcast unmanned vehicle identifier.Unmanned vehicle identifier can be broadcasted during initialization program.Can be
Unmanned vehicle identifier is broadcasted during authentication procedure.It is alternatively possible to via wireless signal (for example, radio signal, light are believed
Number or acoustical signal) broadcast unmanned vehicle identifier.The identifier can be broadcasted using direct communication.Or can be with
The identifier is broadcasted using indirect communication.
User identifier and/or unmanned vehicle identifier can be received by Verification System.User identifier and/or nobody
Aircraft identifier can receive at the authentication center of Verification System or air traffic control system.User identifier and/or nobody fly
Row device identifier can be by unmanned vehicle and/or the remote control of unmanned vehicle.User identifier and/or unmanned flight
Device identifier can receive at one or more processors, one or more of processors can determine user whether by
Authorized operation unmanned vehicle.
It can be made by means of one or more processors to whether user is authorized to operation unmanned vehicle 830 really
It is fixed.Determination can be made on unmanned vehicle machine or outside unmanned vehicle machine.Can be on the remote control of user or user
It is determined outside remote control.Determination can be made at the device separated with unmanned vehicle and/or remote control.In some feelings
Under condition, determination can be made at the part of Verification System.Can Verification System authentication center (for example, as in Fig. 2
The authentication center 220 of diagram) or air traffic control system (for example, as illustrated in Figure 2 air traffic control system 230) place of Verification System make
It is determined that.
Determination can be made at the device of one or more groups of air traffic control or system that can generate.For example, it be able to can give birth to
Determination is made at the air traffic control system for the air traffic control that operated according to this into one or more groups of unmanned vehicles.It is described one or more groups of
Air traffic control can depend on the position of unmanned vehicle or any other factor on the unmanned vehicle.It can be based on
User identifier and/or unmanned vehicle identifier and generate one or more groups of air traffic control.
When it is determined that user is authorized to operation unmanned vehicle, it may be considered that user identifier and unmanned vehicle mark
Symbol.In some cases, user identifier and unmanned vehicle identifier can only be considered.Or, it may be considered that additional information.
Information on user can be associated with user identifier.For example, on user type (for example, level of skill, experience water
Flat, proof, license, training) information can be associated with user identifier.The flying history of user is (for example, what user flew over
Whether unmanned vehicle type that place, user fly over, user ran into any accident) can be associated with user identifier.
Information on unmanned vehicle can be associated with unmanned vehicle identifier.For example, the letter on unmanned vehicle type
Breath (for example, model, manufacturer, characteristic, performance parameter, operation difficulty level) can be associated with unmanned vehicle identifier.
The flying history of unmanned vehicle is (for example, the unmanned vehicle place flown over, the use that was previously interacted with the unmanned vehicle
Family) can also be associated with unmanned vehicle identifier.During it is determined that whether user is authorized to operation unmanned vehicle,
It is contemplated that the information associated with user identifier and/or unmanned vehicle identifier.In some cases, it may be considered that attached
Add the factor of factor, such as geographic factor, time-giver, environmental factor or any other type.
Alternatively, only sole user is authorized to unmanned vehicle corresponding to operation.Can authorized user with it is corresponding
Unmanned vehicle between provide and correspond.Or multiple users can be authorized to operation unmanned vehicle.Can be through awarding
It is corresponding that many-one is provided between the user of power and corresponding unmanned vehicle.User can be only authorized to operate it is single corresponding to nobody
Aircraft.Or user can be authorized to the multiple unmanned vehicles of operation.Can authorized user with it is multiple it is corresponding nobody
One-to-many correspondence is provided between aircraft.Multiple users can be authorized to the multiple corresponding unmanned vehicles of operation.Can be through awarding
It is corresponding that multi-to-multi is provided between the user of power and multiple corresponding unmanned vehicles.
In some cases, user can be with registered in advance to operate unmanned vehicle.It is for example, only registered in advance with operation
The user of unmanned vehicle can be authorized to operation unmanned vehicle.User can be the registration owner of unmanned vehicle.When
When user buys or receives unmanned vehicle, user can be registered as the owner and/or manipulator of unmanned vehicle.At some
In the case of, multiple users can be registered as the owner and/or manipulator of unmanned vehicle.Or only sole user
It can be registered as the owner and/or manipulator of unmanned vehicle.The sole user be able to can specify be allowed to
Operate one or more other users of unmanned vehicle.In some cases, only with user identifier, registered
It can be authorized to operation unmanned vehicle to operate the user of unmanned vehicle.One or more registration databases can store pass
In the information for the registered user for being allowed to operate unmanned vehicle.Registration database can on unmanned vehicle machine or nobody fly
Outside row device machine.User identifier can be compared with the information in registration database, and only when user identifier and notes
When being associated with the user identifier of unmanned vehicle in volume database and matching, user can be just allowed to operate the unmanned flight
Device.Registration database can be specific to unmanned vehicle.For example, the first user can operate unmanned vehicle 1 with registered in advance,
But registered in advance it cannot operate unmanned vehicle 2.Then the user can be allowed to operate unmanned vehicle 1, but can not
To allow it to operate unmanned vehicle 2.In some cases, registration database can be specific to the type (example of unmanned vehicle
Such as, there are all unmanned vehicles of specific model).
In other cases, registration database can be open, and unrelated with unmanned vehicle.For example, user can be with
Manipulator registered in advance for unmanned vehicle.As long as those specific unmanned vehicles will without any other for authorizing
Ask, it is possible to allow user to manipulate any unmanned vehicle.
Or unmanned vehicle can be given tacit consent to and allow all users to operate the unmanned vehicle.All users can be awarded
Power operates the unmanned vehicle.In some cases, all users not on " blacklist " can be authorized to the operation nothing
People's aircraft.Therefore, when being determined whether user is authorized to operation unmanned vehicle, as long as user is not on the blacklist, then
The user can be authorized to the operation unmanned vehicle.One or more black list databases can be stored on being not allowed to
Operate the information of the user of unmanned vehicle.Black list database can store the user for being not allowed to operate unmanned vehicle
User identifier.Black list database can be on unmanned vehicle machine or outside unmanned vehicle machine.User identifier can be with
Information in black list database compares, and only works as the user identifier in user identifier and black list database not
When matching, user can be just allowed to operate unmanned vehicle.Blacklist registration can specific to unmanned vehicle or nobody fly
The type of row device.For example, user can be included in the blacklist that can not manipulate the first unmanned vehicle, but can not be arranged
In the blacklist for entering second unmanned vehicle that can not fly.Blacklist registration can be specific to unmanned vehicle type.For example, can
Not allow user to manipulate the unmanned vehicle of specific model, and the user is allowed to manipulate the unmanned vehicles of other models.
Or blacklist registration need not be specific to unmanned vehicle or unmanned vehicle type.Blacklist registration can be applied to
All unmanned vehicles.If for example, forbid user to operate any unmanned vehicle, no matter unmanned vehicle identity or class
Type, the user can not be authorized to operation unmanned vehicle, and not allow to operate unmanned vehicle.
The registration of registered in advance or blacklist can be applicable in addition to unmanned vehicle or unmanned vehicle type
Other factors.For example, the registration of registered in advance or blacklist goes for specific position or administrative area.For example, user can be with
It is registered in advance to operate unmanned vehicle in the first administrative area, without it is registered in advance with operated in the second administrative area nobody fly
Row device.This may or may not be knowable for unmanned vehicle identity in itself or type.In another example, in advance
First registration or blacklist registration go for specific weather conditions.For example, when wind speed is more than 30mph, can be by user
It is included in the blacklist that can not operate unmanned vehicle.In another example, it may be considered that other environmental conditions, such as environment are answered
Miscellaneous degree, the density of population or air traffic.
User type can be depended on by whether being authorized to the additional consideration of operation unmanned vehicle for user.For example,
During determining whether user is authorized to operation unmanned vehicle, it may be considered that the users ' skillses or experience level.Such as user
Type etc. can be associated with user identifier on the information of user.Unmanned vehicle is operated when considering whether user is authorized to
When, it may be considered that the information on user such as user type.In one example, only when user has reached threshold value skill
When can be horizontal, the user can just be authorized to operation unmanned vehicle.Fly for example, if user experienced for unmanned vehicle
Capable training, then the user can be authorized to operation unmanned vehicle.In another example have if user experienced to the user
The proof of some airmanships, then the user can be authorized to operation unmanned vehicle.In another example, only when user
During through reaching threshold value experience level, the user can just be authorized to operation unmanned vehicle.If for example, user's log recording
The flight time unit of at least certain threshold number, then the user can be authorized to operation unmanned vehicle.In certain situation
Under, threshold number go for the flight time unit of any unmanned vehicle or be only applicable to have match it is described nobody
The flight time unit of the unmanned vehicle of the type of aircraft.Information on user can include uniting on the population of user
Meter learns information.For example, only when user reaches threshold age (for example, being adult), the user can just be authorized to operation nothing
People's aircraft.During it is determined that whether user is authorized to operation unmanned vehicle, it can pull and by means of one or more
Individual processor considers the information on user and/or unmanned vehicle.It is determined that whether user is authorized to operation unmanned flight
During device, one or more considerations can be made according to non-transient computer-readable media.
As it was noted above, during it is determined that whether user is authorized to operation unmanned vehicle, it may be considered that it is additional because
Element, such as geographic factor, time factor or environmental factor.For example, only some users can be authorized to be night time operation nobody
Aircraft, and other users can be authorized to be only in day time operation unmanned vehicle.In one example, night flying is lived through
The user of training can be authorized on daytime and night time operation unmanned vehicle, and the user for not yet living through night-flying training can
It is only authorized in day time operation unmanned vehicle.
In some cases, the unmanned vehicle certification of different mode can be provided.For example, in pattern registered in advance,
The user of mistake only registered in advance can be authorized to manipulation unmanned vehicle.In open mode, all users can be authorized to manipulation
Unmanned vehicle.In the pattern based on technical ability, only having shown the user of a certain technical ability or experience level can be allowed to
Manipulate unmanned vehicle.In some cases, single-mode can be provided for user authentication.In other cases, user can be with
Switch between user operation mode.For example, the owner of unmanned vehicle can switch the certification of unmanned vehicle to be run
Pattern.In some cases, the position of unmanned vehicle, time, air traffic level, environmental condition etc. other because
Element can determine the certification mode of unmanned vehicle to be run.For example, if environmental condition is windy or is difficult to fly,
Unmanned vehicle automatically can only allow authorized user under technical ability pattern to manipulate the unmanned vehicle.
When the uncommitted operation unmanned vehicle of user, the user is not allowed to operate unmanned vehicle 840.At some
In the case of, this can cause unmanned vehicle to be not responsive to the order of the remote control from user and/or user.User can not
Unmanned vehicle can be made to fly or control the flight of unmanned vehicle.User can not control any of unmanned vehicle
Miscellaneous part, such as payload, carrier, sensor, communication unit, navigation elements or power cell.User can or
Person can not make unmanned vehicle be powered.In some cases, user can make unmanned vehicle be powered, but it is described nobody
Aircraft can be not responsive to the user.If user is unwarranted, unmanned vehicle can alternatively power themselves down.
In some cases, warning or the message of its uncommitted operation unmanned vehicle can be provided a user.Can provide or
The reason for user is uncommitted can not be provided.It is alternatively possible to provide the uncommitted operation institute of user to second user
State unmanned vehicle or the user has attempted to operate warning or the message of unmanned vehicle.Second user can be for nobody
The owner or manipulator of aircraft.Second user can be authorized to the individual of operation unmanned vehicle.Second user can be with
It is the individual for exercising the control to unmanned vehicle.
In some alternate embodiments, when the uncommitted operation unmanned vehicle of user, it can only allow the use
Family operates unmanned vehicle in a limited manner.This can include geographical limitation, time restriction, rate limitation, to one or more
The limitation that individual additional component (for example, payload, carrier, sensor, communication unit, navigation elements, power cell etc.) uses.
This can include operator scheme.In one example, when the uncommitted operation unmanned vehicle of user, the user can not be
Selected opening position operation unmanned vehicle.In another example, when the uncommitted operation unmanned vehicle of user, the use
Family only can operate unmanned vehicle in selected opening position.
When user is authorized to operation unmanned vehicle, the user can be allowed to operate unmanned vehicle 850.Nobody flies
Row device can be in response to the order from user and/or the remote control of user.User can control flying for unmanned vehicle
Any other part of row or unmanned vehicle.User can be by inputting to control nobody manually via the user of remote control
Aircraft.In some cases, unmanned vehicle override user can be inputted with accordance with one group of air traffic control automatically.Described one group
Air traffic control can preestablish, or can awing receive.In some cases, setting up or providing
During one group of air traffic control, one or more geography fence devices can be used.
The aspect of the present invention can be related to a kind of method for operating unmanned vehicle.Methods described can include:Receive nothing
People's aircraft identifier, the unmanned vehicle identifier uniquely identify out the unmanned flight from other unmanned vehicles
Device;User identifier is received, the user identifier uniquely identifies out the user from other users;By means of one or
Multiple processors, assess whether the user identified by the user identifier is authorized to operation by the unmanned vehicle identifier
The unmanned vehicle of mark;And when the user is authorized to and operates the unmanned vehicle, it is allowed to which the user is to described
Unmanned vehicle is operated.Similarly, a kind of non-wink for the programmed instruction for including and being used to operate unmanned vehicle can be provided
State computer-readable medium, the computer-readable medium include:Uniquely identified for receiving from other unmanned vehicles
Go out the programmed instruction of the unmanned vehicle identifier of the unmanned vehicle;Uniquely identified out for receiving from other users
The programmed instruction of the user identifier of the user;For assessing whether the user identified by the user identifier is authorized to behaviour
Make the programmed instruction of the unmanned vehicle by unmanned vehicle identifier mark;And for being authorized to behaviour in the user
Make the programmed instruction for allowing the user to operate the unmanned vehicle during unmanned vehicle.
Furthermore it is possible to a kind of unmanned vehicle authoring system is provided, including:First communication module;It is and one or more
Processor, it is operably coupled to the first communication module and is either individually or collectively configured for:Receive nothing
People's aircraft identifier, the unmanned vehicle identifier uniquely identify out the unmanned flight from other unmanned vehicles
Device;User identifier is received, the user identifier uniquely identifies out the user from other users;Assess by the use
Whether the user of family identifier mark is authorized to the unmanned vehicle that operation is identified by the unmanned vehicle identifier;And work as
The user be authorized to operate the unmanned vehicle when, transmission signal with allow the user to the unmanned vehicle carry out
Operation.A kind of unmanned vehicle (UAV) authorization module can include:One or more processors, its either individually or collectively by
It is disposed for:Receive unmanned vehicle identifier, the unmanned vehicle identifier from other unmanned vehicles uniquely
Identify the unmanned vehicle;User identifier is received, the user identifier uniquely identifies out institute from other users
State user;Assess whether the user identified by the user identifier is authorized to operation by unmanned vehicle identifier mark
Unmanned vehicle;And when the user is authorized to and operates the unmanned vehicle, transmission signal is to allow the user
The unmanned vehicle is operated.
Second user can take over from the first user and control the unmanned vehicle.In some cases, first use
Family and second user can be authorized to the operation unmanned vehicle.Or only second user be authorized to operation it is described nobody
Aircraft.First user can be authorized to operates unmanned vehicle in a manner of more limited for second user.Second
User can be authorized to operates unmanned vehicle in a manner of more unrestricted for the first user.One or more can be provided
Individual operation grade.Higher operation grade can indicate that user can operate the priority of apparatus of transport.For example, in operation nothing
In terms of people's aircraft, the user in higher operation grade can be prior to the user in relatively low operation grade.In higher
Control unmanned vehicle can be taken over from the user in relatively low operation grade by operating the user of grade.In certain situation
Under, second user can be in higher operation grade than the first user.Compared to the user in relatively low operation grade, it is in
The user of higher operation grade can alternatively be authorized to operates unmanned vehicle in a manner of more unrestricted.Compared in compared with
The user of height operation grade, the user in relatively low operation grade can alternatively be authorized to operates nothing in a manner of more limited
People's aircraft.When second user is authorized to operation unmanned vehicle and has the operation grade than the first user Geng Gao, institute
State the operation that second user can be from first user adapter to unmanned vehicle.
When second user described in unmanned vehicle certification operates the privilege of the unmanned vehicle, can allow by second
User operates to unmanned vehicle.The certification can be occurred by means of digital signature and/or digital certificate, the number
Word is signed and/or digital certificate is verified to the identity of the second user.Certification to second user and/or the first user
Can use as herein other everywhere described any verification process and occur.
In some embodiments, can adapter control second user can be emergency service a part.For example, second
User can be a part for law enforcement agency, Fire-Fighting Service, medical services or disaster relief service.Second user can be electronics
Police.In some cases, second user can be a part for government organs, such as can control air traffic or other
The mechanism of the type magnitude of traffic flow.Second user can be air traffic control system manipulator.The user can be the member of Verification System
Or manager.Second user can be the member of defense force or quasi- defense force.For example, second user can be USAF
(Air Force), United States Coasts Guard (Coast Guard), National Guard of the United States (National Guard), China are military
Fill any other type in police force (China Armed Police Force (CAPF)) or any administrative area in the world
Defense force or the member that organizes on an equal basis.
When second user, which is taken over, to be controlled, the first user can be notified.For example, warning can be provided to the first user or disappeared
Breath.Warning or message can be provided via the remote control of the first user.Warning can be visual display, or can be can
Hear or tactile is recognizable.In some embodiments, second user can ask to control nobody from the first user adapter
Aircraft.First user can select to receive or refuse the request.Or second user can need not come from first
The receiving of user perhaps can in the case of take over control.In some embodiments, on second user i.e. will take over control and
Alert and there may be some lag times between the time of the first user and the time of second user adapter control.Or, there is provided
Seldom lag time does not provide lag time, to allow second user to take over immediately.Second user can energy
It is enough to attempt being less than 1 minute, 30 seconds, 15 seconds, 10 seconds, 5 seconds, 3 seconds, 2 seconds, 1 second, 0.5 second, 0.1 second, 0.05 second for adapter control
Or inner connecting tube control in 0.01 second.
Second user can take over from the first user and control in response to any scene.In some embodiments, second
User can the adapter control when unmanned vehicle enters limited regional.When unmanned vehicle leaves it is described limited regional when, can
So that control is given back into first user.Second user can operate the nothing when unmanned vehicle is in limited area
People's aircraft.In another case, second user being capable of the unmanned vehicle of adapter control at any time.In certain situation
Under, when safety is determined or ensures that second user being capable of adapter control unmanned vehicle when threatening.If for example, detection
When advancing on the navigation channel to be collided to unmanned vehicle with aircraft, then second user can take over control to avoid
The collision of unmanned vehicle and aircraft.
Certification
The user of unmanned vehicle can be authenticated.User can be uniquely identified by means of user identifier.
User identifier can be authenticated to verify that the user is strictly the user associated with user identifier.For example, such as
Fruit user carries out tagging using the user identifier associated with Bob Smith, then the user can be authenticated
To confirm that the user is strictly Bob Smith.
Unmanned vehicle can be authenticated.Nobody can be uniquely identified out by means of unmanned vehicle identifier
Aircraft.Unmanned vehicle identifier can be authenticated with verify the unmanned vehicle be strictly and the unmanned flight
The associated unmanned vehicle of device identifier.For example, if unmanned vehicle use is associated with unmanned vehicle ABCD1234
Unmanned vehicle identifier carry out tagging, then the unmanned vehicle can be authenticated to confirm the unmanned flight
Device is strictly unmanned vehicle ABCD1234.
In some cases, user can be authorized to operation unmanned vehicle.One or more individual consumers can operate
It may need to be identified before unmanned vehicle.The identity of user may need to be authenticated to be the individual that the user calls oneself, with
Just the user is allowed to operate unmanned vehicle.Before allowing user to operate unmanned vehicle, it is necessary to certification and confirmation first
User identity, certified identity are authorized to operation unmanned vehicle.
Fig. 9 shows the mistake for determining whether user and being operated to unmanned vehicle according to embodiment of the present invention
Journey.The process can include being authenticated user 910 and being authenticated unmanned vehicle 920.If user is not led to
Verification process is crossed, then the user may not be allowed to operate unmanned vehicle 940.If the not authenticated mistake of unmanned vehicle
Journey, then the user may not be allowed to operate the unmanned vehicle 940.Whether operation nothing can be authorized to user
People's aircraft 930 and make determination.If the uncommitted operation unmanned vehicle of user, the user may not be allowed to operate
Unmanned vehicle 940.If user can allow the user to operate unmanned vehicle 950 by the verification process.Such as
Fruit unmanned vehicle can then allow the user to operate unmanned vehicle 950 by the verification process.If user is awarded
Power operation unmanned vehicle, then can allow the user to operate unmanned vehicle 950.In some cases, user is being allowed
Before operating unmanned vehicle 950, the user and the unmanned vehicle must all pass through verification process.Alternatively, permitting
Before family allowable operation unmanned vehicle 950, user and unmanned vehicle all must must quilts by verification process and user
Authorized operation unmanned vehicle.
In some cases, any situation is gone for the license for operating unmanned vehicle, or can be only applicable
In the volume assigned in one or more or area.For example, user/unmanned vehicle may be needed by certification to grasp completely
Make unmanned vehicle.In other cases, user can generally operate unmanned vehicle, but be selected in limited area etc.
In fixed spatial domain, it may be necessary to user is authenticated to operate unmanned vehicle.
One aspect of the present invention can be related to a kind of method for operating unmanned vehicle, and methods described includes:To nobody
The identity of aircraft is authenticated, wherein the identity of the unmanned vehicle can uniquely distinguish with other unmanned vehicles;
The identity of user is authenticated, wherein the identity of the user can uniquely distinguish with other users;By means of one or
Multiple processors, assess whether the user is authorized to the operation unmanned vehicle;And when the user is authorized to operation
When the unmanned vehicle and the unmanned vehicle and the user are certified, it is allowed to the user to it is described nobody fly
Row device is operated.Similarly, a kind of non-transient calculating for the programmed instruction for including and being used to operate unmanned vehicle can be provided
Machine computer-readable recording medium, the computer-readable medium include:For the programmed instruction being authenticated to the identity of unmanned vehicle, its
Described in the identity of unmanned vehicle can uniquely be distinguished with other unmanned vehicles;For being authenticated to the identity of user
Programmed instruction, wherein the identity of the user can uniquely distinguish with other users;For being handled by one or more
Device assesses the programmed instruction whether user is authorized to the operation unmanned vehicle;And for being awarded as the user
Power, which is operated when the unmanned vehicle and the unmanned vehicle and the user are certified, allows the user to described
The programmed instruction that unmanned vehicle is operated.
Moreover, provided herein is system and method can include a kind of unmanned vehicle Verification System, including:First communication
Module;And one or more processors, it is operably coupled to the first communication module and either individually or collectively
It is configured for:The identity of unmanned vehicle is authenticated, wherein the identity of the unmanned vehicle can with other nobody
Aircraft uniquely distinguishes;The identity of user is authenticated, wherein the identity of the user can be with other users uniquely
Distinguish;Assess whether the user is authorized to the operation unmanned vehicle;And when the user is authorized to described in operation
Transmission signal when unmanned vehicle and the unmanned vehicle and the user are certified, to allow the user to described
Unmanned vehicle is operated.A kind of unmanned vehicle authentication module can include:One or more processors, its individually or
Jointly it is configured for:The identity of unmanned vehicle is authenticated, wherein the identity of the unmanned vehicle can be with it
He uniquely distinguishes unmanned vehicle;The identity of user is authenticated, wherein the identity of the user can be with other users
Uniquely distinguish;Assess whether the user is authorized to the operation unmanned vehicle;And when the user is authorized to behaviour
Make the unmanned vehicle and transmission signal when the unmanned vehicle and the user are certified, to allow the user
The unmanned vehicle is operated.
User identifier and/or unmanned vehicle identifier can by herein other everywhere it is described it is any in a manner of carry out
Collect.For example, during flight, unmanned vehicle can in a continuous manner or it is in office why will when broadcast its identity letter
Breath.For example, when receiving the instruction of the monitoring from air traffic control system (for example, police) or when unmanned vehicle and air traffic control system
Between communication is to be encrypted and during certification, unmanned vehicle can be accorded with broadcast user identification.The broadcast of identification information can be with
Various modes are (for example, radio signal, optical signal, acoustical signal or such as other described any other types everywhere herein
Direct communication or indirect communication method) realize.
User and/or unmanned vehicle can be carried out using as known in the art or later developed any technology
Certification.Other further detail below and example for providing user and/or unmanned vehicle certification everywhere herein.
Unmanned vehicle
Unmanned vehicle can be authenticated by means of the key of unmanned vehicle.Unmanned vehicle can have only
One unmanned vehicle identifier.Further unmanned vehicle can be authenticated by means of unmanned vehicle identifier.
Unmanned vehicle identifier and unmanned vehicle key information can be used in conjunction with to be authenticated to unmanned vehicle.Can
To provide unmanned vehicle identifier and/or unmanned vehicle key on unmanned vehicle machine.Unmanned vehicle identifier and/
Or key can be a part for the mark module of unmanned vehicle.Mark module can be that the flight control of unmanned vehicle is single
A part for member.Such as this paper, other are described everywhere, and mark module can not can separate with flight control units.Unmanned flight
Device identifier and/or unmanned vehicle key can not can remove from unmanned vehicle.Unmanned vehicle can not be from nothing
Unmanned vehicle identifier and unmanned vehicle key disassociation on people's aircraft machine.In a preferred embodiment, nobody
Aircraft identifier and/or unmanned vehicle key can not be wiped free of or be changed.
Other are provided everywhere herein further describes to unmanned vehicle certification.Other are carried in more detail everywhere herein
For the further detail below that how can be occurred using the unmanned vehicle certification of unmanned vehicle identifier and/or key.
According to certain embodiments of the present invention, authentication center cannot to no unmanned vehicle identifier and nobody fly
Any unmanned vehicle of row device key is authenticated.If unmanned vehicle identifier or unmanned vehicle key are lost,
The unmanned vehicle cannot be successfully accessed air traffic control system and any activity cannot be carried out in flight confined area.
Under certain situation, if be not authenticated to unmanned vehicle identity, nobody described in user's complete operation may not be allowed to fly
Row device.Or user may not be allowed to operate unmanned vehicle in limited spatial domain, but it can be allowed to be grasped in other areas
Make the unmanned vehicle.It can prevent and punish any violation activity of such unmanned vehicle.
Under some specific environments, unmanned vehicle and user can not do certification, directly start aerial mission.For example,
When between unmanned vehicle, user and authentication center communication connection can not be established, user still can be allowed to start described appoint
Business.In some cases, if establishing communication connection during task, can occur to user and/or unmanned vehicle
Certification.If user and/or unmanned vehicle can take responsive measures not over certification.For example, unmanned vehicle
It can land after the predetermined time period.In another case, unmanned vehicle can make a return voyage to flight starting point.If user
And/or unmanned vehicle has passed through certification, then the user can continue in an uninterrupted manner enter unmanned vehicle
Row operation.In some cases, communication connection is established during task, is not also occurred to user and/or unmanned flight
The certification of device.
If having had been started up task without authentication, certification can be betided in task later.Root
According to whether by certification, it can take or flight responsive measures can not be taken.Or when certification may occur, later
Task in certification does not occur.Any number of factor can be based on and be made whether to continue during task certification really
It is fixed.Such as, it may be considered that one or more environmental conditions.Such as, it may be considered that amblent air temperature, topological structure, the density of population, sky
The middle magnitude of traffic flow or surface magnitude of traffic flow, environment complexity or any other environmental condition.For example, unmanned vehicle can
It is determined that (for example, being determined by means of GPS and map) its be located in city or in the suburb, and if it is located at suburb
In, then it may not necessarily be authenticated.Therefore, certification can be needed when the higher density of population be present, and it is relatively low when existing
Can be without certification during the density of population.Certification can be needed when the density of population exceedes density of population threshold value.In another case,
Certification can be needed when higher transport air flow metric density be present, and can when relatively low transport air flow metric density be present
With without certification.Certification can be needed when transport air flow metric density exceedes threshold value.Similarly, when environment complexity (for example,
The surrounding objects of higher number or density) it is higher when can need certification, and can be without certification when environment complexity is relatively low.
Certification can be needed when environment complexity exceedes threshold value.During certification is determined the need for, it may be considered that other classes
The factor of type, herein such as geographical, time and other described any other factors everywhere.
When unmanned vehicle flight without authentication, its flight performance may be restricted.Can basis
One group of air traffic control is flown to limit unmanned vehicle.One group of air traffic control can include the behaviour that can influence unmanned vehicle
The one or more rule of work.In some embodiments, only when unmanned vehicle flight without authentication
The unmanned vehicle can be limited according to air traffic control, else if being authenticated to unmanned vehicle, is not then applied
Any group of air traffic control.Or in the normal operation period, unmanned vehicle can be limited according to one group of air traffic control, and
If be not authenticated to unmanned vehicle, one group of additional air traffic control can be applied.In some embodiments, no matter
Whether unmanned vehicle is authenticated, unmanned vehicle operation can be limited according to one group of air traffic control, but it is described
One group of air traffic control may be based on whether to be authenticated unmanned vehicle and require different rules.In some cases,
If be not authenticated to unmanned vehicle, rule can be more restricted.Generally speaking, unmanned vehicle is not recognized
Card can cause the manipulator of unmanned vehicle according to any aspect of unmanned vehicle (for example, flight, payload operation or
Positioning, carrier, sensor, communication, navigation, electricity using or for the use of any other) control the relatively freedom in minor affairs of unmanned vehicle
Degree.
The example of the type for the unmanned vehicle flight performance that may be restricted can include one in the following
Or it is multinomial, or can include such as other other kinds of limitations described everywhere, for unmanned vehicle herein.Example
Such as, the distance of unmanned vehicle flight can be limited, for example, it must be in the vision coverage area of user.Flight can be limited
Height and/or speed.It is alternatively possible to require equipment (such as camera or other kinds of effective carried by unmanned vehicle
Load) temporary suspension operation.
Different limitations can be applied according to the grade of user.For example, for more experienced user, can apply compared with
Few limitation.For example, the user with higher experience or level of skill can be allowed, which to perform novice users, may be not allowed to hold
Capable function.The user with higher experience or level of skill can be allowed to be not allowed to the region of flight in novice users
Or flown in position.Such as this paper, other are described everywhere, can be that user type and/or the customization of unmanned vehicle type be directed to nobody
One group of air traffic control of aircraft.
Unmanned vehicle can communicate with Verification System.In some instances, Verification System can have as herein its
His one or more characteristics described by (for example, Fig. 2) everywhere.Unmanned vehicle can communicate with the air traffic control system of Verification System
Letter.Any description to the communication between unmanned vehicle and air traffic control system goes for unmanned vehicle and certification system herein
Any communication between any other part of system.Herein to any description of the communication between unmanned vehicle and air traffic control system
Go for unmanned vehicle and any other outside dresses that can aid in unmanned vehicle flight safety, guarantee or control
Put or system between communication.
Unmanned vehicle can communicate with air traffic control system in any way.For example, unmanned vehicle can be with blank pipe system
System forms direct communication channel.The example of direct communication channel can include dedicated radio link, WiFi, WiMax, it is infrared,
The direct communication of bluetooth or any other type.Unmanned vehicle can form indirect communication channel with air traffic control system.Communication
It can be relayed via one or more middle devices.In one example, communication can be (all via user and/or user's set
Such as remote control) relaying.Alternatively or additionally, communication can relay via other single or multiple unmanned vehicles.Communication can
With via earth station, router, tower or satellite relay.Unmanned vehicle can use single mode or multiple described herein
Mode communicates.Any communication mode can be combined.In some cases, different communication patterns can be used simultaneously.Alternatively
Ground or additionally, unmanned vehicle can switch between different communication patterns.
Unmanned vehicle (may combine with user) is by mutual with authentication center's (or any part of Verification System)
After certification, the safe communication connection with air traffic control system can be obtained.It can also obtain between unmanned vehicle and user
Secure communication connects.Unmanned vehicle can be directly geographical with the air situation monitoring server and/or one or more of air traffic control system
Fence apparatus communicates.Unmanned vehicle can also be communicated with user and can relayed via user, to reach in certification
The heart or air traffic control system.In some embodiments, it is straight with air situation monitoring server and/or one or more geography fence devices
Connect after the certification generation that letter can occur over just unmanned vehicle and/or user.Or even if certification not yet occurs, directly
Connecting letter can also occur.In some embodiments, the communication between unmanned vehicle and user can occur over just nobody
After the certification of aircraft and/or user.Or even if the certification of unmanned vehicle and/or user not yet occur, unmanned flight
Communication between device and user can also occur.
In some embodiments, the flight plan of unmanned vehicle registered in advance can be carried out with utilization system.For example,
User can need to specify planning location and/or the timing of flight.Whether air traffic control system may be able to determine that allows unmanned flight
Device flies according to flight plan.Flight plan can be accurate or can substantially estimate.During flight, nobody flies
Row device can independently be controlled or semi-autonomous controlled to be flown according to flight plan.Or user can have freely
The right of eminent domain to control unmanned vehicle manually, but it should being maintained in the estimate of flight plan.In some cases, Ke Yijian
The flight of unmanned vehicle is controlled, and if the flight plan deviation for controlling and suggesting manually is excessive, then can force the nothing
People's aircraft takes flight responsive measures.Flight responsive measures can include force unmanned vehicle return on navigation channel (for example, by
Computer or it is another individual adapter flight), force unmanned vehicle landing, force unmanned vehicle hover or force nobody fly
Row device makes a return voyage to its starting point.In some cases, air traffic control system can the flight plan based on other unmanned vehicles, current prison
Any flight restriction or any other factor of the air situation, environmental condition, region and/or the time that measure determines whether
Unmanned vehicle flies according to flight plan.In the alternative, it may not be necessary to flight plan it is registered in advance.
Establish after safety chain, unmanned vehicle can from the traffic administration module application resource of air traffic control system (for example,
Air route and navigation time or herein other described any other resources everywhere).Traffic administration module can manage
Traffic is weighed.Unmanned vehicle can receive one group of air traffic control to flight (for example, distance, height, speed or other are each herein
The air traffic control of any other type of place description).Unmanned vehicle only can just take off when obtaining clearance.Fly
Row plan can be put on record in traffic administration.
During flight, unmanned vehicle periodically can report its state to the air situation monitoring subsystem of air traffic control system.Can
So that the state of unmanned vehicle is transmitted to air situation monitoring subsystem using any technology.Direct communication or a connection can be used
Letter, such as other those described communications everywhere herein.It is determined that unmanned vehicle state and to air situation monitoring subsystem
During transferring status data, it can use or can be without using external sensor data.In some instances, nobody flies
Row device status information can be broadcasted, or can relay to traffic management subsystem by earth station or other middle devices.Nothing
People's aircraft can receive the supervision of traffic management subsystem.Traffic management subsystem can use direct or indirect communication party
Method, such as other described methods everywhere herein, communicate with unmanned vehicle.If changing predetermined flight, nobody
Aircraft can be submitted to traffic management subsystem to be applied.The application can be submitted before unmanned vehicle flight starts,
Or it can occur after unmanned vehicle has begun to flight.When unmanned vehicle flight, can be applied.Traffic
Management can have the ability of the flight of monitoring unmanned vehicle.Traffic management subsystem can be according to from unmanned vehicle
Information and/or the information of one or more sensors outside unmanned vehicle monitor the flight of unmanned vehicle.
During flight, unmanned vehicle (can include but is not limited to other unmanned vehicles or geography with other devices
Fence apparatus) communicate.During flight, unmanned vehicle can with can be authenticated (include but is not limited to digital signature+
Digital certificate) and/or response (for example, in response to certified geography fence device).
During flight, such as other are described in further detail everywhere herein, and unmanned vehicle can receive to use from greater degree
The adapter control at family (such as air traffic control system or electronic police).It is more high if unmanned vehicle is authenticated to privilege
Level user can take over the control.
After flying, unmanned vehicle can discharge the resource of application.If the response to traffic management subsystem surpasses
When, then the resource applied can also be discharged.For example, resource can be plan unmanned vehicle flight position and/or
Regularly.At the end of flight, unmanned vehicle can send signal to discharge resource to traffic management subsystem.Or traffic
Managing subsystem can be with release of the self-starting to resource.If unmanned vehicle stopping and traffic administration after predetermined amount of time
Subsystem communicates, then traffic management subsystem can be with release of the self-starting to resource.In some cases, if application when
Between section terminate (for example, if as task and 3:00-4:Block unmanned vehicle in 00PM period, and 4:00
Cross), then traffic management subsystem can be with release of the self-starting to resource.
Unmanned vehicle can respond certification request and/or identity checks request.The request can come from Verification System.
In some cases, request may come from air situation monitoring server.Request can occur when unmanned vehicle is powered.Request
It can occur when unmanned vehicle makes requests on to resource.Request can arrive before the flight of unmanned vehicle.Or
Request can arrive during the flight of unmanned vehicle.In some embodiments, there is the unmanned vehicle of security function
The certification request from air situation monitoring server and/or identity checks request will be responded.In some implementations, can be any
Situation is responded under (it may include authentification failure).
During flight, if communication disruption and/or disconnection between unmanned vehicle and air traffic control system,
Unmanned vehicle can rapidly return back to the state of flight of relatively limited right and quickly make a return voyage.Therefore, if nobody flies
Communication disruption between row device and air traffic control system, then it can take flight responsive measures.In some cases, flight responsive measures
Can unmanned vehicle is maked a return voyage automatically to starting point.Flight responsive measures can unmanned vehicle is flown automatically to nobody
The position of the user of aircraft.Flight responsive measures can unmanned vehicle is maked a return voyage automatically to position of going home, described to go home
Position may or may not be the starting point of unmanned vehicle flight.Flight responsive measures can be landed automatically.Flight rings
It can be flown automatically into autonomous flight pattern, wherein unmanned vehicle according to flight plan registered in advance to answer measure.
User
User can be the manipulator of unmanned vehicle.User can be classified according to user type.At one
In example, user can be classified according to the technical ability and/or experience level of user.Verification System can be sent for using
The identification information at family.For example, Verification System can be responsible for user's certificate and distribute corresponding to user identifier and/or
User key.In some cases, ID registration databases can perform one or more functions.For example, ID registration databases can
To provide user identifier and/or user key.
User can be authenticated.User authentication can use as is generally known in the art or later developed any technology and
Occur.User authentication technique can be similar or different to unmanned vehicle authentication techniques.
In one example, user can be authenticated based on customer-furnished information.Can based on user
The knowledge that can have is authenticated to user.In some cases, the knowledge only may be known by the user, without quilt
Well known to other users.For example, user can be authenticated by providing correct username and password.Can by by
User submits password, password, key entry or slides the information of mobile, signature or any other type to be authenticated to user.Can
To be authenticated by one or more inquiries of correct response system to user.In some embodiments, user can be with
Apply for login name and/or password from authentication center.User can use the login name and password to be logged in.
User can be authenticated based on the physical trait of user.The biometer on unmanned vehicle can be used
Information is measured to be authenticated to user.For example, user can be authenticated by submitting biological information.For example, with
Family can undergo finger scan, palmmprint scanning, iris scan, retina scanning or sweeping to any other part of user's body
Retouch.User can provide body sample, can such as be analyzed to identify the saliva of user, blood, the nail cut or cut
Hair.In some cases, the DNA analysis to the sample from user can occur.Can be by undergoing face recognition or step
State is identified to be authenticated to user.User can be authenticated by submitting vocal print.User can submit the body of user
High and/or body weight is for analysis.
User can be authenticated based on the device that can be in the possession of the user.Can be based on can be in the possession of the user
Information on memory cell and/or the memory cell is authenticated to user.For example, user can have by certification
The storage arrangement that center, the other parts of Verification System or any other source are issued.Storage arrangement can be that outside is deposited
The storage arrangement of reservoir device, such as USB flash disk (for example, USB drives), external hard drive driving or any other type.One
In a little embodiments, external device (ED) is coupled to user remote controller.For example, the external device (ED) such as USB flash disk can be with physical connection
It can communicate to remote control (for example, in insertion/insertion remote control) or with remote control (for example, transmission can be connect by remote control
The signal arrived).Described device can be physical storage storage device.
User can be authenticated based on the information in the memory that can be in the possession of the user can be stored in.It can make
With or can be without using single physical memory device.For example, token (such as digitizing token) can be gathered around by user
Have.Digitlization token can be stored on the memory of USB flash disk, hard drive or other forms.Digitlization token can be stored in
On the memory of remote control.For example, digitized token can by remote control and from authentication center, ID registration databases or appoint
What his source receives.In some embodiments, digitlization token can outside from the memory of remote control be read
Take.It may or may not be modifiable on the memory of remote control to digitize token.
User can be authenticated by means of may be provided in the mark module on remote control.Mark module can with
Family is associated.Mark module can include user identifier.In some embodiments, mark module can include user key
Information.The data being stored in mark module can be or can not be and can be read from outside.It is stored in mark module
Data can not be alternatively modifiable.Mark module can alternatively can be not separated from remote control.Mark is alternatively
It can not be removed in the case where not damaging flight controller from remote control.Mark module can be optionally integrated in remote control.
Information in mark module can be recorded in the case via authentication center.For example, authentication center can retain to from remote control
The record of the information of the mark module of device.In one example, user identifier and/or user key can be remembered by authentication center
Record on record.
User can be authenticated by undergoing mutual authentication process.In some cases, mutual authentication process can
With similar to certifiede-mail protocol (AKA) process.Can be by means of using the use to be communicated with unmanned vehicle by user
Key in the terminal of family is authenticated to user.The terminal can send one or more to unmanned vehicle
The remote control of individual command signal.The terminal can show the display of information based on the data received from unmanned vehicle
Device.Alternatively, key can be a part for the mark module of user terminal and can be integrated in user terminal.Key
It can be a part for the mark module of remote control and can be integrated in remote control.Key can by Verification System (for example,
The ID registration databases of Verification System) provide.Other mutual authentications that can provide user in more detail everywhere enter one herein
Walk example and details.
In some embodiments, user may need to have to operate the software of unmanned vehicle or application.Software
A part for user authentication process itself can be authorized to be with application.In one example, user can have smart phone
App, the app can be used for operating unmanned vehicle.Directly smart phone app can be authorized in itself.When to user
When the smart phone app used is authenticated, it can use or can be without using further user authentication.In some feelings
Under condition, smart phone mandate can with herein other be described in detail everywhere, additional user authentication process is coupled.In certain situation
Under, smart phone app, which is authorized, can be enough to be authenticated user.
User can be authenticated by means of Verification System.In some cases, user can be by Verification System
Authentication center (for example, authentication center 220 as illustrated in Figure 2) or any other part of Verification System are recognized
Card.
User authentication can put generation at any time.In some embodiments, can be with when unmanned vehicle is opened
It is automatic that user authentication occurs.When remote control is opened, user authentication can occur automatically.When remote control and unmanned vehicle are formed
During communication channel, user authentication can occur.When remote control and/or unmanned vehicle form communication channel with Verification System,
User authentication can occur.User authentication can occur in response to the input from user.For example, when user's logon attempt or
When information (for example, user name, password, biological information) on user is provided, user authentication can occur.In another example
In, when the information for coming from storage arrangement (for example, USB flash disk) is supplied into Verification System, or work as information (for example, numeral
Change token or key) when being supplied to Verification System, user authentication can occur.Therefore can recognize from user or user's set push
Card process.In another example, when from Verification System or the request certification of another external source, user authentication can occur.Certification
The authentication center of system or air traffic control system can ask the certification to user.Authentication center or air traffic control system can be with one or many
Ask the certification from user.Certification can occur before the flight of unmanned vehicle and/or the flight phase of unmanned vehicle
Between.In some cases, user can be authenticated before aerial mission is performed using unmanned vehicle.It can fly
Plan is authenticated before can going through to user.Can be before user can carry out control to unmanned vehicle to the use
Family is authenticated.User can be authenticated before unmanned vehicle can be allowed to take off.Can lose and/or rebuild with
User is authenticated after the connection of Verification System.When detecting one or more events or situation (for example, uncommon nothing
People's aircraft flight pattern) when, user can be authenticated.When there occurs it is suspicious, to unmanned vehicle without permission
Adapter when, user can be authenticated.When there occurs it is suspicious, to the Communication Jamming of unmanned vehicle when, can to
Family is authenticated.When unmanned vehicle, which deviates, it is expected flight plan, user can be authenticated.
Similarly, unmanned vehicle certification can occur at any time, all as mentioned above for user authentication
Time.User and unmanned vehicle certification can substantially simultaneously occur (for example, each other at 5 minutes or less, 4 minutes or more
Less, 3 minutes or less, 2 minutes or less, 1 minute or less, 30 seconds or less, 15 seconds or less, 10 seconds or less, 5 seconds or
Less, occur within 3 seconds or less, 1 second or less, 0.5 second or less or 0.1 second or less).User and unmanned vehicle
Certification can occur in similar condition or scene.Or they can be in the different time and/or in response to difference
Condition or scene and occur.
The information on user can be collected after being authenticated to user.Information on user can include this
Other described any information everywhere of text.For example, described information can include user type.User type can include user
Technical ability and/or experience level.Described information can include the past flying quality of user.
Authentication center
A kind of Verification System can be provided according to the embodiment of the present invention.The Verification System can include in certification
The heart.Any description to authentication center goes for any part of Verification System herein.Herein to Verification System
Any description goes for external device (ED) or entity, or the one or more functions of Verification System can be in unmanned vehicle
Perform above and/or on a remote control.
Authentication center can be responsible for safeguarding on one or more users and/or the data of unmanned vehicle.Data can be with
User identifier including association, the user key of association, the unmanned vehicle identifier of association and/or the unmanned flight of association
Device key.Authentication center can receive the identity of user and/or the identity of unmanned vehicle.In some embodiments, certification
System can be responsible for safeguarding on one or more users and all data of unmanned vehicle.Or Verification System can be born
Duty is safeguarded on one or more users and the subset of all data of unmanned vehicle.
The controller (for example, remote control of user) and unmanned vehicle of unmanned vehicle can send to air traffic control system and step on
Record request.Controller and/or unmanned vehicle can send logging request before the flight of unmanned vehicle.Controller and/
Or unmanned vehicle can send logging request before the flight of unmanned vehicle is allowed.As controller and/or unmanned flight
When device is opened, controller and/or unmanned vehicle can send logging request.When being established between controller and unmanned vehicle
During connection, either when establishing connection between controller and external device (ED) or when unmanned vehicle and external device (ED) it
Between establish connection when, controller and/or unmanned vehicle can send logging request.Controller and/or unmanned vehicle can be with
Logging request is sent in response to the event or the situation that detect.When provide for certification instruction when, controller and/or nobody
Aircraft can send logging request.When providing the instruction for certification by external source (for example, authentication center), controller
And/or unmanned vehicle can send logging request.Controller and/or unmanned vehicle can initiate logging request, Huo Zheke
To provide logging request in response to the initiation outside controller and/or unmanned vehicle.Controller and/or unmanned flight
Device can propose logging request at the single time point of unmanned vehicle ession for telecommunication.Or controller and/or unmanned vehicle
Logging request can be proposed at multiple time points of unmanned vehicle ession for telecommunication.
Controller and unmanned vehicle can substantially simultaneously propose logging request (for example, each other less than 5 minutes, it is few
In 3 minutes, less than 2 minutes, less than 1 minute, less than 30 seconds, less than 15 seconds, less than 10 seconds, less than 5 seconds, less than 3 seconds, less than 1
Second, less than proposing logging request within 0.5 second or less than 0.1 second).Or controller and unmanned vehicle can be when different
Between propose logging request.Controller and unmanned vehicle can be proposed to log according to the detection to same event or situation and asked
Ask.For example, when establishing connection between controller and unmanned vehicle, controller and unmanned vehicle are proposed that login please
Ask.Or controller and unmanned vehicle can propose logging request according to different event or situation.Therefore, controller
Logging request can be proposed independently of one another with unmanned vehicle.For example, controller can propose to log in when controller is powered
Request, and unmanned vehicle can propose logging request when unmanned vehicle is powered.These events can be independent of each other
Time occurs.
Any description to logging request goes for such as other described any kind of certifications everywhere herein.Example
Such as, any description to logging request goes for providing username and password.In another example, logging request is appointed
What description goes for the startup of AKA agreements.In another example, any description to logging request can include user's
The offer of physical trait.Logging request can start verification process or request certification.
After the logging request of user from unmanned vehicle and/or unmanned vehicle is received, Verification System can be with
Initiate verification process.In some cases, air traffic control system can receive logging request and can be initiated using authentication center
Verification process.Or authentication center can receive logging request and voluntarily initiate verification process.Landing request information can be passed
Authentication center is transported to, and authentication center can be authenticated to identity information.In some cases, landing request information can wrap
Include user name and/or password.In some embodiments, log-on message can include user identifier, user key, nobody fly
Row device identifier and/or unmanned vehicle key.
Communication connection between air traffic control system and authentication center can be safe and reliable.Alternatively, air traffic control system and
Authentication center can utilize one or more groups of identical processors and/or Memory Storage Unit.Or they can not be utilized
One or more groups of identical processors and/or Memory Storage Unit.Air traffic control system and authentication center can utilize or
One group of hardware of identical can not be utilized.Can or air traffic control system and authentication center can not be provided at same position.
In some cases, hardwired connection can be provided between air traffic control system and authentication center.Or can air traffic control system with
Radio communication is provided between authentication center.Direct communication can be provided between air traffic control system and authentication center.Or Ke Yi
Indirect communication is provided between air traffic control system and authentication center.Communication between air traffic control system and authentication center can travel through or can
With not traverses network.Communication connection between air traffic control system and authentication center can be encrypted.
After the certification to user and/or unmanned vehicle is carried out at authentication center, in unmanned vehicle and blank pipe system
Communication connection is established between system.In some embodiments it may be desirable to the certification to both user and unmanned vehicle.Or
Person, the certification to user or the certification to unmanned vehicle can be enough.Can be alternatively in remote control and blank pipe system
Communication connection is established between system.Alternatively or additionally, communication connection can be established between remote control and unmanned vehicle.
Have built up communication connection (all connections as described herein) and may occur or may not occur further certification afterwards.
Unmanned vehicle can communicate via direct access communication channel with the air traffic control system.Or unmanned vehicle
It can be communicated via indirect communication channel with the air traffic control system.Unmanned vehicle can be by via user or the use
Remote control operated by family then communicates in carrying out with the air traffic control system.Unmanned vehicle can be by via one or more
Other individual unmanned vehicles then communicate in carrying out with the air traffic control system.The communication of any other type can be provided, it is all
As herein other it is described everywhere communicate.
The remote control of user can communicate via direct access communication channel with the air traffic control system.Or remote control can
To be communicated via indirect communication channel with the air traffic control system.Remote control can by via operated by user nobody fly
Row device then communicates in carrying out with the air traffic control system.Remote control can be by via other one or more unmanned vehicles
Then communicated in progress with the air traffic control system.The communication of any other type can be provided, such as other each places of this paper
Those communications of description.In some cases, without providing the communication connection between remote control and air traffic control system.In certain situation
Under, the communication connection between remote control and unmanned vehicle can be enough.Can be between remote control and unmanned vehicle
There is provided any kind of communication, such as other described those communications everywhere herein.
After being authenticated to user and/or unmanned vehicle, friendship of the unmanned vehicle to air traffic control system can be allowed
Logical management module application resource.In some embodiments it may be desirable to the certification to both user and unmanned vehicle.Or
Person, the certification to user or the certification to unmanned vehicle can be enough.
Resource can include air route and/or navigation time.Resource can be used according to flight plan.Resource can be with
Including one or more in the following:Sense with avoiding auxiliary, the access to one or more geography fence devices, to electricity
The access at pond station, the access to fuel station or to the access at base station and/or stop.It can provide such as other each places of this paper
Any other resource of description.
The traffic administration module of air traffic control system can record one or more flight plans of unmanned vehicle.It can allow
The modification of predetermined flight of the unmanned vehicle application to unmanned vehicle.Can allow unmanned vehicle start flight plan it
The flight plan of the preceding modification unmanned vehicle.Unmanned vehicle can be allowed to be carrying out flying in the unmanned vehicle
Flight plan is changed during plan.Traffic administration module can be made whether to allow unmanned vehicle to carry out asked modification really
It is fixed.If allowing unmanned vehicle to carry out asked modification, flight plan can be updated with including the modification asked.Such as
Fruit does not allow unmanned vehicle to carry out asked modification, then can not change of flight plan.It can require that unmanned vehicle is abided by
Keep initial flight plan.If unmanned vehicle deviates significantly from flight plan (either initial is still updated),
Flight responsive measures can be applied to unmanned vehicle.
In some embodiments, it is after being authenticated at authentication center to user and/or unmanned vehicle, can be with
Communication connection is established between unmanned vehicle and one or more geography fence devices.Other are provided on ground everywhere herein
Manage the further detail below of fence apparatus.
It is at authentication center after being authenticated to user and/or unmanned vehicle, can be in unmanned vehicle and one
Communication connection is established between individual or multiple certified intermediates.Certified intermediate can be it is another it is certified nobody fly
Row device or certified geography fence device.Certified intermediate can be base station either can trunking traffic station or dress
Put.Certified intermediate can undergo any kind of verification process, such as other described those certifications everywhere herein
Process.For example, certified intermediate can pass through certification using AKA processes.
The determination whether user is authorized to operation unmanned vehicle can be made.Can be to user and/or unmanned flight
Device be authenticated before, while being authenticated to user and/or unmanned vehicle or to user and/or unmanned flight
Device makes determination after being authenticated.If the uncommitted operation unmanned vehicle of user, the user can not be allowed to grasp
Make unmanned vehicle.If the uncommitted operation unmanned vehicle of user, the user can only can be in a limited manner
Operate unmanned vehicle.When the uncommitted operation unmanned vehicle of user, it can only allow the user in selected position
Operate unmanned vehicle.One or more air traffic control can be applied to the user for operating unmanned vehicle without permission, it is all
As herein other it is described everywhere air traffic control.In some implementations, in the uncommitted operation unmanned vehicle of user
When one group of air traffic control being applied on the user can be than institute can be applied to when user is authorized to operation unmanned vehicle
Stating the control on user has more limitations or tightened up.When user be authorized to operation unmanned vehicle when, can or can
Not apply one group of air traffic control on the user.When user is authorized to operation unmanned vehicle, the user is applied to
On one group of air traffic control can include null value.When user be authorized to operation unmanned vehicle when, user can with not by
The mode of limit operates unmanned vehicle.Or some limitations can be applied, but these are limited and in the uncommitted operation nothing of user
The limitation that can be applied to user during people's aircraft is compared, can be less strict or can be with different.
One group of air traffic control can depend on the identity of unmanned vehicle and/or the identity of user.In some cases, may be used
One group of air traffic control is changed with the identity according to unmanned vehicle and/or the identity of user.Unmanned flight can be based on
The identity of device adjusts or kept the limitation of the flight to unmanned vehicle.It can adjust or keep pair based on the identity of user
The limitation of the flight of unmanned vehicle.In some embodiments, one group of acquiescence of the flight to unmanned vehicle can be provided
Limitation.The default value can be in place before certification and/or mark unmanned vehicle.The default value can certification and/
It is or in place before mark user.According to user and/or the certified identity of unmanned vehicle, it can keep or adjust and be described silent
Recognize value.In some cases, the default value can be adjusted to restricted one group of lower air traffic control.In other situations
Under, the default value can be adjusted to restricted one group of higher air traffic control.
In some embodiments, if having carried out mark and certification, the user to user and/or unmanned vehicle
The operation unmanned vehicle can be authorized to.In some cases, though to user and/or unmanned vehicle carried out mark and
Certification, the user may also be not authorized to the unmanned vehicle.Whether user is authorized to operation unmanned vehicle can be only
Stand on and whether user and/or unmanned vehicle are authenticated.In some cases, mark and/or certification can occur true
Determine user whether be authorized to before, so as to make user whether be authorized to operation unmanned vehicle determination before to the use
Family and/or the unmanned vehicle are confirmed.
In some cases, only sole user is authorized to operation unmanned vehicle.Or multiple users can be authorized to operation
Unmanned vehicle.
The unmanned vehicle can be authenticated before allowing unmanned vehicle to take off.Nobody can allowed to fly
Row device is authenticated before taking off to user.User can be carried out before allowing user to carry out to the control of unmanned vehicle
Certification.Can be before allowing user to send one or more operational orders to unmanned vehicle via user remote controller to user
It is authenticated.
Certification degree
Different degrees of certification can occur.In some cases, different verification process can occur, such as herein its
His described those verification process everywhere.In some cases, the certification of higher degree can occur, and in other situations
Under, the certification of lower degree can occur.In some embodiments, can be on the degree or class of the verification process to be undergone
Type and make determination.
One aspect of the present invention provides a kind of side for the authentication level for determining the operation for unmanned vehicle (UAV)
Method, methods described include:Receive the context information on the unmanned vehicle;Using one or more processors, based on institute
State context information and assess the certification degree of the user to the unmanned vehicle or the unmanned vehicle;According to the certification
Degree realizes the certification to the unmanned vehicle or the user;And described in allowing when completing the certification of the degree
User operates to the unmanned vehicle.Similarly, a kind of include can be provided to be used to determine for operation unmanned flight
The non-transient computer-readable media of the programmed instruction of the authentication level of device (UAV), the computer-readable medium include:For
Receive the programmed instruction of the context information on the unmanned vehicle;For being assessed based on the context information to the nothing
The programmed instruction of the certification degree of the user of people's aircraft or the unmanned vehicle;For being realized according to the certification degree
The programmed instruction of certification to the unmanned vehicle or the user;And for being provided when completing the certification of the degree
Allow the programmed instruction for the signal that the user operated to the unmanned vehicle.
A kind of unmanned vehicle (UAV) Verification System can include:Communication module;And one or more processors, its
It is operably coupled to the communication module and is either individually or collectively configured for:Receive on the unmanned flight
The context information of device;Recognizing to the user of the unmanned vehicle or the unmanned vehicle is assessed based on the context information
Card degree;And the certification to the unmanned vehicle or the user is realized according to the certification degree.One can be provided
Kind unmanned vehicle (UAV) authentication module, including:One or more processors, it is either individually or collectively configured for:
Receive the context information on the unmanned vehicle;Assessed based on the context information to the unmanned vehicle or described
The certification degree of the user of unmanned vehicle;And realized according to the certification degree to the unmanned vehicle or the use
The certification at family.
Certification degree for user and/or unmanned vehicle can be provided.In some cases, for the certification of user
Degree can be variable.Or for the certification degree of user can be fixed.For the certification degree of unmanned vehicle
Can be variable.Or for the certification degree of unmanned vehicle can be fixed.In some embodiments, for
The certification degree of user and unmanned vehicle can be variable.Alternatively, for user and the certification journey of unmanned vehicle
Degree can be fixed.Or for user certification degree can be it is variable and for unmanned vehicle certification journey
Degree can be fixed, or can be fixed while that the certification degree for being directed to unmanned vehicle can for the certification degree of user
To be variable.
Certification degree can include not requiring any certification for user and/or unmanned vehicle.For example, certification degree
Can be zero.Therefore, certification degree can include not being authenticated unmanned vehicle or user.Certification degree can include pair
Unmanned vehicle and user are authenticated.Certification degree can include being authenticated unmanned vehicle without carrying out user
Certification, or can include being authenticated user without being authenticated unmanned vehicle.
The certification degree can be selected from for unmanned vehicle and/or multiple options of the certification degree of user.
For example, three options of the certification degree for unmanned vehicle and/or user can be provided (for example, high certification degree, medium
Certification degree or low certification degree).Can provide any number of certification degree option (for example, 2 or more, 3 or
More, 4 or more, 5 or more, 6 or more, 7 or more, 8 or more, 9 or more
Individual, 10 or more, 12 or more, 15 or more, 20 or more, 25 or more options).One
In the case of a little, certification degree can be generated and/or determined in the case where being selected not from one or more preset selective items.It is described
Certification degree can be generated awing.
Compared to relatively low certification degree, higher certification degree may provide for user be identified user or
Unmanned vehicle is the higher levels of determination of identified unmanned vehicle.Compared to relatively low certification degree, higher recognizes
Card degree may provide for user identifier and actual user matches and/or unmanned vehicle identifier and actual nothing
The higher levels of determination that people's aircraft matches.Higher certification degree can more tightened up than relatively low certification degree be recognized
Card process.Higher certification degree can include the verification process with relatively low certification degree and add additional authentication procedures.For example,
Relatively low certification degree can only include username/password combination, and higher certification degree can include usemame/password group
Conjunction adds AKA verification process.Alternatively, higher certification degree can take more resources or calculate power.Alternatively, compared with
High certification degree can take a greater amount of time.
Any description to certification degree goes for auth type herein.For example, auth type use can be selected from
Multiple different options.Auth type can indicate that or can not indicate higher certification degree.According to context information,
Different types of verification process can be selected.For example, being based on context information, certification can be used for using username/password combination,
Or certification can be used for using biometric data.According to context information, AKA verification process can occur and add biometric
Data authentication, or usemame/password can occur and add biological sample data authentication.Herein to any of selection certification degree
Description can be applicable to select auth type.
Context information can be used for assessing certification degree.Context information can include on user, unmanned vehicle, remote control
Device, geography fence device, environmental condition, geographical conditions, timing condition, communication or network condition, task risk are (for example, attempt
Adapter or interference risk) information or any other kinds of information that can be relevant with task.Context information can include by
User, remote control, unmanned vehicle, geography fence device, Verification System, external device (ED) are (for example, external sensor, external number
According to source) or any other device provide information.
In one example, context information can include environmental condition.For example, context information can include grasping in it
Make the environment of unmanned vehicle.The environment can be environmental form, such as rural areas, rural areas or downtown area.When
Unmanned vehicle is located at when in downtown area can be than requiring higher certification journey when unmanned vehicle is located in rural areas
Degree.It can recognize when unmanned vehicle is located in downtown area than requiring higher when unmanned vehicle is located in rural areas
Card degree.Can be than requiring higher when unmanned vehicle is located in rural areas when unmanned vehicle is located in rural areas
Certification degree.
Environmental condition can include the density of population of environment.When unmanned vehicle is located at the environment with compared with high population density
Higher certification degree is required when can be than in being located at the environment with the relatively low density of population when unmanned vehicle when middle.When nobody
Aircraft is located at the density of population and meets or exceeds the certification degree that can require higher when in the environment of population threshold value, and works as nobody
Aircraft be located at population degree not less than or less than in the environment of population threshold value when can require relatively low certification degree.It can carry
For any number of population threshold value, it is determined for certification degree.For example, three population threshold values can be provided, wherein when
Reach and/or during more than each threshold value, increased certification degree can be required.
Environmental condition can include the magnitude of traffic flow degree in environment.The magnitude of traffic flow can include air traffic and/
Or the magnitude of traffic flow based on surface.The magnitude of traffic flow based on surface can include the ground apparatus of transport and/or waterborne in environment
Apparatus of transport.Can be than being located at when unmanned vehicle when in the environment that unmanned vehicle is located at higher magnitude of traffic flow degree
Higher certification degree is required when in the environment with relatively low magnitude of traffic flow degree.When unmanned vehicle is located at magnitude of traffic flow degree
The certification degree that can require higher when in the environment of magnitude of traffic flow threshold value is met or exceeded, and when unmanned vehicle is located at traffic
Flow degree not less than or less than in the environment of the magnitude of traffic flow threshold value when can require relatively low certification degree.It can provide any
The magnitude of traffic flow threshold value of number, it is determined for certification degree.For example, five magnitude of traffic flow threshold values can be provided, wherein
When reaching and/or more than each threshold value, increased certification degree can be required.
Environmental condition can include the environment complexity of environment.Environment complexity can indicate that the barrier in environment
And/or potential potential safety hazard.Environment complexity factors can be used to indicate that barrier takes the degree of environment.Environment complexity because
Son can be quantitative measurment or observational measurement.In some embodiments, can based in the following it is one or more come
Determine environment complexity factors:The volume or percentage in the space that the number of barrier, barrier take, in unmanned vehicle
Volume or percentage, the volume or percentage in the space not hindered by barrier in the space taken in a certain distance by barrier
Than, in a certain distance of unmanned vehicle not by barrier hinder space volume or percentage, barrier fly away from nobody
The distance of row device, obstacle density (for example, the barrier number in per unit space), the type of barrier (for example, it is static or
It is mobile), the motion (for example, speed, acceleration) etc. of the space layout (for example, position, direction) of barrier, barrier.Example
Such as, the environment with of a relatively high obstacle density will be with high environment complexity factors (for example, indoor environment, city ring
Border) it is associated, and the environment with relatively low obstacle density will be with low environment complexity factors (for example, high idle loop
Border) it is associated.In another example the environment that barrier occupies the space of larger percentage wherein will have higher complexity
Degree, and the environment in the unimpeded space with larger percentage will be with relatively low complexity.Then can be based on giving birth to
Into environment representation carry out computing environment complexity factors.Can the 3-dimensional digital based on the environment generated using sensing data
Represent to determine environment complexity factors.3-dimensional digital represents that three-dimensional point cloud can be included or takes grid.Work as unmanned vehicle
Can be than being located at the ring with compared with low environment complexity when unmanned vehicle when in the environment with higher environment complexity
Higher certification degree is required when in border.Environment complexity threshold is met or exceeded when unmanned vehicle is located at environment complexity degree
Can require higher certification degree when in the environment of value, and when unmanned vehicle be located at environment complexity degree not less than or it is low
Relatively low certification degree can be required when in the environment of environment complexity threshold.Any number of environment complexity can be provided
Threshold value, it is determined for certification degree.For example, two environment complexity thresholds can be provided, wherein when reaching and/or surpass
When crossing each threshold value, increased certification degree can be required.
Environmental condition can include environmental weather conditions.The example of weather conditions can include but is not limited to temperature, precipitation,
Wind speed or wind direction or any other weather conditions.There are more extreme or potentially harmful weather conditions when unmanned vehicle is located at
Environment in when can than when unmanned vehicle be located at less extreme or harmful weather conditions environment in when require more
High certification degree.Higher certification journey can be required when unmanned vehicle, which is located at, to be met or exceeded in the environment of weather threshold value
Degree, and can require relatively low certification degree when unmanned vehicle is in the environment not less than or less than weather threshold value.Can
To provide any number of weather threshold value, it is determined for certification degree.For example, multiple weather threshold values can be provided, its
In when reaching and/or more than each threshold value, increased certification degree can be required.
Context information can include geography information.For example, context information can include the position of unmanned vehicle.Scene is believed
Breath can include the geographical flight restriction for unmanned vehicle position.Some positions can be classified as sensitive position.At some
In example, the position can include airport, school, campus, hospital, military area, place of safety, research institution, administrative area terrestrial reference,
Power plant, private residence, shopping center, the position of any other type of aggregation ground.In some cases, the position can be returned
The one kind or multiclass of class into " sensitiveness " level that can indicate that position.When unmanned vehicle is located at the position with compared with high sensitive
Can be than requiring higher certification degree when unmanned vehicle is located at and has the opening position compared with low sensitivity when putting place.For example,
Can be than requiring higher certification degree when user is located at shopping center when unmanned vehicle is located at safe military installations.When
Unmanned vehicle, which is located at when susceptibility meets or exceeds the opening position of position sensing threshold value, can require higher certification degree,
And when unmanned vehicle be located at susceptibility not less than or less than position sensing threshold value opening position when can require relatively low and recognize
Card degree.Any number of position sensing threshold value can be provided, it is determined for certification degree.For example, it can provide
Multiple position sensing threshold values, wherein when reaching and/or more than each threshold value, increased certification degree can be required.
Context information can include time-based information.Time-based information can be including certain in one day for the moment
Between, some day in one week, the date, month, season, season, time or any other time-based information.Compared to other
Period, for these periods, higher certification degree can be required.For example, in one with higher historical traffic flows
Higher certification degree can be required in some day in week.For certain in one day with higher historical traffic flows or accident
One time, higher certification degree can be required.For the season with more extreme amblent air temperature, it can require higher and recognize
Card degree.When the time is in the range of one or more specified times, higher certification degree can be required.It can provide any
The specified time scope of number, it is determined for certification degree.For example, ten time ranges can be provided, and for
Each time range needs different certification degree or type.In some cases, can be with it is determined that during certification degree
Simultaneously weight is assigned for polytype time range.Such as, it may be considered that in one day sometime with one week in it is a certain
It and for its assign weight, to determine certification degree.
Context information can include the information on user.Context information can include the identity of user.The identity of user
It can indicate that user type.Context information can include user type.The example of user type can include the technical ability of user
Horizontal and/or experience.As herein other described any other user profile may be used as context information everywhere.When user has
Having can be than requiring higher certification degree when user has more technical ability or experience during less technical ability or experience.When with
Family can require lower certification degree when having the technical ability or experience level for meeting or exceeding technical ability or empirical value, and work as and use
Family can require higher certification degree when having the technical ability or experience level less than or equal to technical ability or empirical value.It can carry
For any number of technical ability or empirical value, it is determined for certification degree.For example, three technical ability or experience can be provided
Threshold value, wherein when reaching and/or more than each threshold value, the certification degree reduced can be required.
Context information can include the information on unmanned vehicle.Context information can include the body of unmanned vehicle
Part.The identity of unmanned vehicle can indicate that unmanned vehicle type.Context information can include unmanned vehicle type.Nothing
The example of people's type of aircraft can include the model of unmanned vehicle.As herein other everywhere described any other nobody
Aircraft information may be used as context information.It can compare when unmanned vehicle model is model that is more complicated or being more difficult to operation
Higher certification degree is required when unmanned vehicle model is model that is simpler or being physically easier to perform.When unmanned flight's type
Number complexity or difficulty higher certification degree can be required when meeting or exceeding complexity or difficulty threshold value, and when nobody flies
The complexity or difficulty of row type number can require relatively low certification degree when being less than or equal to complexity or difficulty threshold value.Can be with
Any number of complexity or difficulty threshold value is provided, it is determined for certification degree.For example, four complexities can be provided
Or difficulty threshold value, wherein when reaching and/or more than each threshold value, increased certification degree can be required.
Context information can include the complexity of being performed by unmanned vehicle for task.Unmanned vehicle is during task
One or more tasks can be performed.Task can include flying along flight path.Task can include collecting on nobody
The information of aircraft environment.Task can include data of the transmission from unmanned vehicle.Task can include pickup, carry
And/or place payload.Task can include the power on management unmanned vehicle machine.Task can include monitoring or photography
Task.In some cases, used during in completion task and more calculated or handle money on unmanned vehicle machine
During source, task complexity can be higher.In one example, detect mobile target and follow the movement using unmanned vehicle
The task of target can be more more complicated than the task of the music of the loudspeaker played pre-recorded from unmanned vehicle.Work as unmanned flight
Having a high regard for can be than requiring higher certification degree when unmanned vehicle task is simpler when being engaged in more complicated.When unmanned flight has a high regard for
Business complexity can require higher certification degree when meeting or exceeding task complexity threshold, and when unmanned vehicle task is answered
Miscellaneous degree can require relatively low certification degree when being less than or equal to task complexity threshold.Any number of task can be provided to answer
Miscellaneous degree threshold value, it is determined for certification degree.For example, multiple tasks complexity threshold can be provided, wherein when reach and/
Or during more than each threshold value, increased certification degree can be required.
Context information can include the information on communication system around.For example, the presence of wireless signal or not in environment
In the presence of the example that can be context information.In some cases, can provide influence one or more surrounding wireless signals can
Energy property is as context information.The number of wireless signal can influence or can not influence to wireless around one or more in environment
The possibility that signal has an impact.Provided that greater number of signal, then there may be at least one possibility among them
It is affected compared with high likelihood.The safe class of wireless signal can influence or can not influence to one or more in environment
The possibility that surrounding wireless signal has an impact.For example, the wireless signal with some guarantees is more, then they will be affected
Possibility it is smaller.Can be more one or more than when influenceing when the possibility for influenceing one or more surrounding wireless signals is higher
Higher certification degree is required when the possibility of surrounding wireless signal is relatively low.Can when influence one or more surrounding wireless signals
When energy property meets or exceeds communication threshold, higher certification degree can be required, and when the one or more surrounding wireless communications of influence
Number possibility when being less than or equal to communication threshold, relatively low certification degree can be required.Any number of communication can be provided
Threshold value, it is determined for certification degree.For example, multiple communication thresholds can be provided, wherein when reaching and/or more than each
During threshold value, increased certification degree can be required.
The risk for disturbing the operation of unmanned vehicle can be the example of context information.Context information can include on nothing
Information of people's aircraft by the risk of hacker attacks/abduction.Another user can attempt to take over control in an unauthorized manner
Unmanned vehicle.Can be than being wanted when the risk of hacker attacks/abduction is relatively low when higher hacker attacks/abduction risk be present
Seek higher certification degree.Higher certification can be required when the risk of hacker attacks/abduction meets or exceeds risk threshold value
Degree, and relatively low certification degree can be required when the risk of hacker attacks/abduction is less than or equal to risk threshold value.It can carry
For any number of risk threshold value, it is determined for certification degree.For example, multiple risk threshold values can be provided, wherein when
Reach and/or during more than each threshold value, increased certification degree can be required.
Context information can include the information of the risk on interference unmanned vehicle communication.For example, it is another without permission
User can disturb the communication of authorized user and unmanned vehicle in an unauthorized manner.Unauthorized user can
To disturb order of the authorized user to unmanned vehicle, this may be influenceed to the control to unmanned vehicle.Without permission
User can disturb and sent from unmanned vehicle to the data of the device of authorized user.When higher interference be present, nobody flies
Can be than requiring higher certification degree when the risk of interference unmanned vehicle communication is relatively low during the risk of row device communication.When dry
The risk of unmanned vehicle communication is disturbed when meeting or exceeding risk threshold value, higher certification degree can be required, and when interference nothing
When the risk of people's aircraft communication is less than or equal to risk threshold value, relatively low certification degree can be required.Any number can be provided
Purpose risk threshold value, it is determined for certification degree.For example, multiple risk threshold values can be provided, wherein when reaching and/or
During more than each threshold value, increased certification degree can be required.
Context information can include the information on one or more groups of air traffic control.Context information can include on region
In flight restriction degree information.This can be based on current winged limitation or history flight restriction.Flight restriction can be by controlling
Entity applies.Can be than when relatively low flight restriction degree in region being present when higher flight restriction degree in region be present
Certification degree higher Shi Yaoqiu.It can require higher when the flight restriction degree in region meets or exceeds threshold limit
Certification degree, and relatively low certification degree can be required when the flight restriction degree in region is less than or equal to threshold limit.
Any number of threshold limit can be provided, it is determined for certification degree.For example, multiple threshold limits can be provided,
Wherein when reaching and/or more than each threshold value, increased certification degree can be required.
It is determined that during for the certification degree of user and/or unmanned vehicle, can individually or in combination make
With any kind of context information.The type of used context information can remain identical or can change.When commenting
When estimating polytype context information, them can be substantially simultaneously assessed to obtain the determination to certification degree.Polytype
Context information can be considered as equal factor.Or can be that polytype context information assigns weight, and differ
Surely need for equal factor.Context information type with bigger weight can be to identified certification degree with bigger shadow
Ring.
The determination to certification degree can be made on unmanned vehicle machine.Unmanned vehicle can be received and/or generated
Used context information.The one or more processors of unmanned vehicle can be from external data source (for example, Verification System)
Or the data source (for example, sensor, clock) on unmanned vehicle machine receives context information.In some embodiments, one
Or multiple processors can be from the air traffic control system receive information outside unmanned vehicle machine.Information from air traffic control system can be evaluated
To determine certification degree.Information from air traffic control system can be context information, or can be additional to other each places herein
The type of the context information of description.One or more processors can be determined using the context information received with making.
The determination to certification degree can be made outside unmanned vehicle.For example, determination can be made by Verification System.
In some cases, the air traffic control system outside unmanned vehicle machine or authentication center can make the determination on certification degree.Recognize
The one or more processors of card system can from external data source (for example, unmanned vehicle, external sensor, remote control) or
Data source (for example, clock, information on other unmanned vehicles) in Verification System receives context information.In some implementations
In mode, one or more of processors can be outside unmanned vehicle, remote control, distance sensor or Verification System
Other external device (ED) receive informations.One or more of processors can be determined using the context information received with making.
In another case, determination can be made on the remote control of user.Remote control, which can be received and/or generated, to be made
Context information.The one or more processors of remote control can be from external data source (for example, Verification System) or remote control
On data source (for example, memory, clock) receive context information.In some embodiments, one or more processors can
With the air traffic control system receive information outside remote control.Information from air traffic control system can be evaluated to determine certification degree.Come
It can be context information from the information of air traffic control system, or other described context information classes everywhere herein can be additional to
Type.One or more of processors can be determined using the context information received with making.
In the determination to certification degree is made based on context information, any other external device (ED) can be used.Can be with
Using single external device (ED) or multiple external device (ED)s can be used in conjunction with.Other external device (ED)s can receive from machine external source or
The context information in airborne source.Other external device (ED)s can include can be used the context information that receives with make the one of determination or
Multiple processors.
Figure 10 show according to embodiment of the present invention can be by the diagram for the air traffic control grade that certification degree is influenceed.Can be with
The air traffic control of operation of unmanned vehicle can be influenceed by generating one group.Certification degree can be based on and generate one group of air traffic control.
One group of air traffic control can be generated based on the certification degree of completion.It is contemplated that whether successfully pass certification.Certification degree can
With any part suitable for system, such as unmanned vehicle certification, user authentication, remote control certification, geography fence device are recognized
The certification of card and/or any other type.
In some embodiments, when certification degree 1010 increases, air traffic control grade 1020 can reduce.If
Through forming higher certification degree, then it can relatively be not concerned with and need the limitation to flight.Certification degree and air traffic control grade
It can be inversely proportional.Certification degree and air traffic control grade can linearly (for example, linear inverse ratio).Certification degree and fly
Row control grade can be with exponentially ratio (for example, exponentially inverse ratio).It can be carried between certification degree and air traffic control grade
For any other inverse relation.In the alternative, the relation can be with directly proportional.The relation can directly into
Linear scale, direct exponentially ratio or any other relation.Air traffic control grade can depend on performed certification degree.
In the alternative, air traffic control grade can be unrelated with certification degree.Can on or can be not in relation to certification journey
Spend and select air traffic control grade.When certification degree is relatively low, restricted one group of higher air traffic control can be generated.Work as certification
When degree is higher, restricted one group of relatively low air traffic control can be generated.Can be based on or certification degree can be not based on and
Generate one group of air traffic control.
One aspect of the present invention is related to a kind of method for the air traffic control grade for determining the operation for unmanned vehicle,
Methods described includes:Using one or more processors, the user to the unmanned vehicle or the unmanned vehicle is assessed
Certification degree;Certification to the unmanned vehicle or the user is realized according to the certification degree;Recognized based on described
Card degree and generate one group of air traffic control;And the operation of the unmanned vehicle is realized according to one group of air traffic control.
Similarly, embodiments of the present invention can be related to a kind of program for the air traffic control grade for including and being used to determine unmanned vehicle
The non-transient computer-readable media of instruction, the computer-readable medium include:For assess to unmanned vehicle or nobody
The programmed instruction of the certification degree of the user of aircraft;For being realized according to the certification degree to the unmanned vehicle or institute
State the programmed instruction of the certification of user;For generating the programmed instruction of one group of air traffic control based on the certification degree;And
For providing the programmed instruction for the signal for allowing to be operated to unmanned vehicle according to one group of air traffic control.
A kind of unmanned vehicle Verification System can be provided, including:Communication module;And one or more processors, its
It is operably coupled to the communication module and is either individually or collectively configured for:Assess to the unmanned vehicle
Or the certification degree of the user of the unmanned vehicle;Realized according to the certification degree to the unmanned vehicle or described
The certification of user;And one group of air traffic control is generated based on the certification degree.A kind of unmanned vehicle authentication module can be with
Including:One or more processors, it is either individually or collectively configured for:Assess to the unmanned vehicle or described
The certification degree of the user of unmanned vehicle;Realized according to the certification degree to the unmanned vehicle or the user
Certification;And one group of air traffic control is generated based on the certification degree.
Such as this paper, other are described everywhere, and certification degree can be included without appoint to user and/or unmanned vehicle
What certification.For example, certification degree can be zero.Therefore, certification degree can include not recognizing unmanned vehicle or user
Card.Certification degree can include being authenticated both unmanned vehicle and user.Certification degree can include to unmanned flight
Device is authenticated without being authenticated to user, or can include being authenticated user without entering unmanned vehicle
Row certification.
The certification degree can be selected from for unmanned vehicle and/or multiple options of the certification degree of user.
For example, three options of the certification degree for unmanned vehicle and/or user can be provided (for example, high certification degree, medium
Certification degree or low certification degree).Can provide any number of certification degree option (for example, 2 or more, 3 or
More, 4 or more, 5 or more, 6 or more, 7 or more, 8 or more, 9 or more
Individual, 10 or more, 12 or more, 15 or more, 20 or more, 25 or more options).One
In the case of a little, certification degree can be generated and/or determined in the case where being selected not from one or more preset selective items.It is described
Certification degree can be generated awing.Unmanned vehicle and/or user can be authenticated according to certification degree.Such as
Fruit/and when unmanned vehicle and/or user are by verification process, then it can be considered as certified.If unmanned vehicle and/
Or user undergoes but not authenticated process, then it can be considered as unauthenticated.For example, identifier/key mismatch can
Example during being not authenticated.There is provided, the not biometric number with the biometric data match on file
According to another example when can be not authenticated.It can be not by recognizing to provide incorrect login username/password combination
Additional example during card process.
Information on certification degree can include the level or species of the certification having occurred and that.The horizontal or species can
To be qualitatively and/or quantitative.One or more types that information on certification degree can include having occurred and that are recognized
Card.The data that information on certification degree can include being collected into during certification are (if for example, certification includes processing biology
Data, then it can provide the biological data in itself).
Certification degree can be based on and generate one group of air traffic control.Any description to certification degree can also be applied herein
In auth type.Can according to such as herein other everywhere described any technology and generate one group of air traffic control.For example, pass through
One group of air traffic control is selected from multigroup air traffic control to generate one group of air traffic control.From the beginning in another example, can be
Start to generate one group of air traffic control.One group of air traffic control can be generated by means of the input from user.
One group of air traffic control can be generated by means of one or more processors.The generation of one group of air traffic control can
To occur on unmanned vehicle machine.Unmanned vehicle can receive and/or generate used certification degree.Unmanned vehicle
One or more processors can be from the data sources on external data source or unmanned vehicle machine on certification degree
Information.In some embodiments, one or more of processors can receive from the air traffic control system outside unmanned vehicle machine
Information.The information from air traffic control system can be assessed to generate one group of air traffic control.One or more of processors can make
Determined with the information on certification degree received with making.
The generation of one group of air traffic control can occur outside unmanned vehicle machine.For example, one group of air traffic control
Generation can be realized by Verification System.In some cases, the air traffic control system outside unmanned vehicle machine or authentication center can be with
Generate one group of air traffic control.The one or more processors of Verification System can be from the number on external data source or Verification System
The information on certification degree is received according to source.In some embodiments, one or more of processors can fly from nobody
Other external device (ED) receive informations outside row device, remote control, distance sensor or Verification System.One or more of processing
Device can use the information on certification degree received and be determined with making.
In another case, the generation of one group of air traffic control can occur on the remote control of user.Remote control
Certification degree used in can receiving and/or generating.The one or more processors of remote control can from external data source or
Information of the data sources on certification degree on remote control.In some embodiments, one or more of processing
Device can be from the air traffic control system receive information outside remote control.The information from air traffic control system can be assessed to generate one group of flight
Control.One or more of processors can use the information on certification degree and be determined with making.
During one group of air traffic control is generated based on certification degree, any other external device (ED) can be used.Can
So that using single external device (ED) or multiple external device (ED)s can be used in conjunction with.Other external device (ED)s can be with slave external source or airborne
Source receives the information on certification degree.Other external device (ED)s can include one or more processors, and the processor can be with
Use the information on certification degree received and determined with making.
Unmanned vehicle can be operated according to one group of air traffic control.The user of unmanned vehicle can send realization
One or more orders of the operation of unmanned vehicle.The order can be sent by means of remote control.It can observe described
The operation of unmanned vehicle is realized in one group of air traffic control.If one or more order does not comply with one group of air traffic control,
It can then keep observing one group of air traffic control so as to unmanned vehicle with order described in override.When the order observes described one
During group air traffic control, the order in the case where not interfering with without that by override and be able to can realize to unmanned flight
The control of device.
Device identification stores
Figure 11 shows the example for storing device information in memory according to embodiment of the present invention.It can provide
Storage system 1110.It can provide from one or more user 1115a, 1115b, one or more user terminals
1120a, 1120b and/or one or more unmanned vehicle 1130a, 1130b information.Described information can include one
Individual or multiple orders, associated user identifiers, associated unmanned vehicle identifier, associated timing information and
Any other associated information.One or more groups of information 1140 can be stored.
Storage system 1110 can include one or more Memory Storage Units.Storage system can be with
Including one or more databases, the database can store information described herein.Storage system can wrap
Include computer-readable medium.One or more electronic memory modules can be provided, such as memory (for example, read-only storage, with
Machine access memory, flash memory) or hard disk." storage " class medium can include computer, processor etc. or it is associated
Module in any or all of Tangible storage, various semiconductor memories, magnetic tape drive, disk drive etc., it can
To provide the non-transient storage for software programming at any time.In some embodiments, non-volatile memory medium example
Such as include any storage device in CD or disk, any one or more computers etc., such as available for realizing number
According to the medium in storehouse etc..Volatile storage medium includes dynamic memory, the main storage of such computer platform.Tangible
Transmission medium includes coaxial cable, copper cash and optical fiber, and it is included in the wire for including bus in computer system.Carrier-wave transmission is situated between
Matter can take the form of electric signal or electromagnetic signal or sound wave or light wave, such as lead in radio frequency (RF) and infrared (IR) data
Those generated during letter.Therefore computer-readable medium common form for example including:Floppy disk, flexible disk, hard disk, tape,
Any other magnetizing mediums, CD-ROM, DVD or DVD-ROM, any other optical medium, card punch paper tape, there are sectional hole patterns
Any other physical storage medium, RAM, ROM, PROM and EPROM, FLASH-EPROM, any other memory chip or boxlike
Memory, the carrier wave of transmission data or instruction, the cable or link of the such carrier wave of transmission, or computer can read volume therefrom
Any other of range code and/or data medium.Many in the computer-readable medium of these forms can participate in carrying one
Individual or multiple instruction one or more sequences are to processor, for performing.
Storage system may be provided on single opening position, or can be distributed on multiple positions.In some realities
Apply in mode, storage system can include single Memory Storage Unit or multiple Memory Storage Units.It can carry
For cloud computer architecture.In some cases, reciprocity (P2P) storage system can be provided.
Storage system can be provided outside unmanned vehicle machine.Can above it be carried in the device outside unmanned vehicle
For storage system.Storage system can be provided outside remote control.Can be on the device outside remote control
Storage system is provided.Storage system can be provided outside unmanned vehicle and remote control.Memory storage
System can be a part for Verification System.Storage system can be a part for air traffic control system.Memory storage system
System can include one or more memory cells, and the memory cell can be the one of the Verification Systems such as air traffic control system
Individual or multiple memory cells.Or storage system can be separated with Verification System.Storage system can be with
Possessed and/or operated by same entity with Verification System.Or storage system can be from Verification System by different realities
Body possesses and/or operated.
Communication system can include one or more loggers.One or more loggers can be received from communication system
Any device data.For example, one or more loggers can receive the data from one or more unmanned vehicles.
One or more loggers can receive the data from one or more users and/or remote control.One or more can be passed through
Individual logger and one or more Memory Storage Units are provided.For example, can be by receiving from unmanned vehicle, user
And/or one or more message of remote control one or more loggers and one or more Memory Storage Units are provided.
One or more loggers can have or can not have the scope of limited receive information.For example, logger can by with
It is set to for receiving data from the device being located at the logger in same physical region.For example, when unmanned vehicle is located at
When in the firstth area, the first logger can receive the information from the unmanned vehicle, and when unmanned vehicle is located at second
When in area, the second logger can receive the information from the unmanned vehicle.Or logger does not have limited scope
And the information from device (for example, unmanned vehicle, remote control) can be received, regardless of whether described device is located at where.Note
Record device can be Memory Storage Unit and/or the information collected can be transmitted to Memory Storage Unit.
Information from one or more user 1115a, 1115b can be stored in storage system.The letter
Breath can include user identity information.The example of user identity information can include user identifier (for example, ID 1, user
ID2, ID 3 ...).User identifier can be unique for user.In some cases, the information from user can
With including helping to be identified user and/or the information of certification.Information from one or more users can include closing
In the information of user.Information from one or more users can include one or more orders from user (for example, life
Make 1, order 2, order 3, order 4, order 5, order 6 ...).One or more order can include realizing unmanned vehicle
The order of operation.One or more order can be used for controlling the flight of unmanned vehicle, the taking off of unmanned vehicle, nobody flies
The landing of row device, the operation of the payload of unmanned vehicle, the operation of carrier of unmanned vehicle, on unmanned vehicle machine
The operation of one or more sensors, one or more communication units of unmanned vehicle, the one or more of unmanned vehicle
Any feature of power cell, one or more navigation elements of unmanned vehicle and/or unmanned vehicle.Any other
The information of type can be provided from one or more users, and can be stored in storage system.
In some embodiments, all user's inputs can be stored in storage system.It is or only selected
User input can be stored in storage system.In some cases, only certain form of user inputs storage
In storage system.For example, in some embodiments, only user identifies input and/or command information is stored in
In storage system.
User can carry optionally with the aid of one or more user terminal 1120a, 1120b to storage system
For information.User terminal can be the device that can be interacted with user.User terminal can be can be with unmanned vehicle
The device interacted.User terminal can be arranged to for sending one or more operational orders to unmanned vehicle
Remote control.User terminal can be arranged to show the display device of data based on the information received from unmanned vehicle.
User terminal can send information and from unmanned vehicle receive information to unmanned vehicle simultaneously.
User can provide information by means of the device of any other type to storage system.For example, can be with
One or more computers or other devices are provided, it can receive user's input.Described device can be to depositing
Reservoir storage communication user inputs.Described device with unmanned vehicle without interacting.
User terminal 1120a, 1120b can provide information to storage system.User terminal can provide on
The information of user, the information of user command or any other type.User terminal can be provided on user terminal itself
Information.For example, user terminal identification can be provided.In some cases, user identifier and/or user terminal mark can be provided
Know symbol.User key and/or user terminal key can be alternatively provided.In some instances, user is not provided on user
Any input of key, but user key information can store on the subscriber terminal or can be can be by user terminal access
's.In some cases, user key information can be stored on the physical storage of user terminal.Or user key letter
Breath can be stored in machine outer (for example, being stored on cloud) and can be by user terminal access.In some embodiments
In, user terminal can transmit user identifier and/or associated order.
Unmanned vehicle 1130a, 1130b can provide information to storage system.Unmanned vehicle can provide
Information on the unmanned vehicle.For example, unmanned vehicle identification information can be provided.Unmanned vehicle identification information
Example can include unmanned vehicle identifier (for example, unmanned vehicle ID1, unmanned vehicle ID2, unmanned vehicle
ID3……).Unmanned vehicle identifier can be unique for unmanned vehicle.In some cases, from unmanned flight
The information of device can include helping to be identified the unmanned vehicle and/or the information of certification.From one or more
The information of unmanned vehicle can include the information on the unmanned vehicle.Letter from one or more unmanned vehicles
One or more orders that breath can include being received by the unmanned vehicle are (for example, order 1, order 2, order 3, order
4th, order 5, order 6 ...).One or more of orders can include the order for realizing the operation of unmanned vehicle.It is described
One or more order can be used for controlling the flight of unmanned vehicle, the taking off of unmanned vehicle, the landing of unmanned vehicle,
The operation of the payload of unmanned vehicle, the operation of the carrier of unmanned vehicle, the one or more on unmanned vehicle machine
The operation of sensor, one or more communication units of unmanned vehicle, one or more power cells of unmanned vehicle, nothing
One or more navigation elements of people's aircraft and/or any feature of unmanned vehicle.The information of any other type
It can provide from one or more unmanned vehicles and can be stored in storage system.
In some embodiments, can before the information storage that user is related is in storage system to
Family is authenticated.For example, can obtain user identifier and/or by storage system store the user identifier it
It is preceding that user is authenticated.Therefore, in some implementations, only certified user identifier is stored in storage system
In.Or user needs not move through certification, and the user identifier claimed can be stored in memory storage system before certification
In system.If having passed through certification, the instruction that user identifier has been verified can be made., can if not authenticated
The instruction of suspicious activity has been marked as to make user identifier, or has made and carries out failure using the user identifier
Authentication attempt instruction.
It is alternatively possible to nobody is flown before by the related information storage of unmanned vehicle in storage system
Row device is authenticated.For example, can obtain unmanned vehicle identifier and/or by storage system store it is described nobody
Unmanned vehicle is authenticated before aircraft identifier.Therefore, in some implementations, only certified unmanned vehicle
Identifier is stored in storage system.Or unmanned vehicle needs not move through certification, and the unmanned vehicle claimed
Identifier can be stored in storage system before certification.If having passed through certification, unmanned flight can be made
The instruction that device identifier has been verified.If not authenticated, unmanned vehicle identifier can be made and be marked as
The instruction of suspicious activity, or make the instruction for the authentication attempt for carrying out failure using the unmanned vehicle identifier.
In some embodiments, only one or more fly just is allowed when user is authorized to operation unmanned vehicle
Line command.Can or can not it is determined that user whether be authorized to operation unmanned vehicle before to the user and/or
The unmanned vehicle is authenticated.Can be before allowing user to operate unmanned vehicle to the user and/or the nothing
People's aircraft is authenticated.In some cases, only when user is authorized to operation unmanned vehicle, storage system
In order can just be stored.Only when user and/or unmanned vehicle pass through certification, the order in storage system
It can just be stored.
Memory Storage Unit can store one or more groups of information 1140.The multipacket message can be included to use by oneself
The information at family, user terminal and/or unmanned vehicle.The multipacket message can include one or more orders, user's mark
Symbol, unmanned vehicle identifier and/or associated time.User identifier can be associated with sending the user of order.Nothing
People's aircraft can be associated with reception and/or exectorial unmanned vehicle.Time can send and/or receive order
Time.Time can will order the time of storage in memory.When time can be that unmanned vehicle is exectorial
Between.In some cases, single order can be provided for a single group information.Or can be that a single group information carries
For multiple orders.The multiple order can include the order sent by user and the corresponding life received by unmanned vehicle
Order.Or single order can be provided, the order can be recorded when being sent from user, or can be flown by nobody
Row device is received and/or is recorded when being performed by unmanned vehicle.
Therefore, the order of correlation can be provided for multipacket message.For example, when user sends order, first can be stored
Group information.It can reflect when user sends order or when a group information stores for the time of the first group information
In storage system.It is alternatively possible to using the data from remote control to provide the first group information.Work as unmanned flight
When device receives order, the second group information can be stored.When can reflect unmanned vehicle for the time of the second group information
Receive order or when a group information is stored in storage system.It is alternatively possible to fly using from nobody
The data of row device provide the second group information with the order based on correlation.When unmanned vehicle, which performs, orders, the can be stored
Three group informations.It can reflect when unmanned vehicle performs order or a group information for the time of the 3rd group information
When it is stored in storage system.It is alternatively possible to using the data from unmanned vehicle with the life based on correlation
Make and the 3rd group information is provided.
Storage system can store interacted on specific between the first user and the first unmanned vehicle it is more
Group information.For example, send multiple orders during being interacted between the first user and the first unmanned vehicle.Interaction can be with
It is the execution of task.In some cases, Memory Storage Unit can only store the information on specific interaction.Or deposit
Reservoir storage system can store to be interacted (for example, multiple tasks) on multiple between the first user and the first unmanned vehicle
Information.Storage system alternatively can store information according to user identifier.The number associated with the first user
According to can store together.Or Memory Storage Unit can store information according to unmanned vehicle identifier.With first
The associated data of unmanned vehicle can store together.Memory Storage Unit can be according to user-unmanned vehicle
Interact to store information.For example, together with being stored with the data that the first unmanned vehicle and the first user associate jointly.
Under certain situation, memory can be stored in only with respect to the information of user, unmanned vehicle or user-unmanned vehicle combination
In memory cell.
Or storage system can be stored on the more of the interaction between multiple users and/or unmanned vehicle
Group information.Storage system can be the data storage bank for collecting the information from multiple users and/or unmanned vehicle.
Storage system can store the information from multiple tasks, its can include each user, each unmanned vehicle and/
Or each user-unmanned vehicle combination.In some cases, the information collection in storage system can search for
Or can index.Can be according to any parameter, such as user identity, unmanned vehicle identity, time, user-unmanned vehicle
Combination, command type, position or any other information, to search or index information collection.Letter can be stored according to any parameter
Breath collection.
In some cases, the information in storage system can be analyzed.Information collection can be analyzed to detect one
Or multiple behavior patterns.Information collection can be analyzed with detect may be relevant with accident or undesirable condition one or more characteristics.
For example, if specific user continually makes the unmanned vehicle of specific model crash, the data can be extracted.Show another
In example, if another user tends to attempt to manipulate unmanned vehicle into according to ground of the one group of air traffic control without allowing flight
Qu Zhong, then it can extract such information.Statistical analysis can be performed to the information collection in Memory Storage Unit.Such system
Meter analysis can aid in mark trend or correlative factor.For example, it may be noted that some unmanned vehicle models in general may be used
So that there is higher accident rate than other unmanned vehicle models.Information collection can be analyzed to determine:When the temperature drop in environment
During to less than 5 degrees Celsius, higher unmanned vehicle fault rate may be typically present.Therefore, can be deposited with comprehensive analysis memory
Information in storage system is to collect the information of the operation on unmanned vehicle.Such comprehensive analysis is without in response to specific
Event or scene.
The information in storage system can be analyzed in response to specific event or scene.If for example,
Generation unmanned vehicle crashes, then can analyze the information associated with the unmanned vehicle and enter one on crash to provide
Walk jurisdictional information.Occur if unmanned vehicle crashes during task, the information that will can be collected into during the task
Collection is pulled together and analyzed.For example, the mismatch between the order sent and the order received can be identified.Can be with
Environmental condition when analysis is crashed.The presence of other unmanned vehicles or barrier in area can be analyzed.In some embodiment party
In formula, information collection from other tasks, for unmanned vehicle can also be pulled.For example, in other tasks, Ke Yijian
Measure to exist and some lucky exempt to hit or failure.Such information is it is determined that crash reason and/or times for needing to take afterwards that crash
What can be useful during acting.
Can be movable to track the unmanned vehicle of individuation with the information that use information is concentrated.It is, for example, possible to use one
Or multiple orders, associated one or more user identifiers and associated one or more unmanned vehicle identifiers
To track the activity of the unmanned vehicle of individuation.
Information collection can be with stored command, user profile, unmanned vehicle information, timing information, positional information, environmental condition
Information, air traffic control information or any condition detected.Any information can correspond to order.For example, geography information can be with
Including the position of unmanned vehicle and/or remote control when sending order.Geography information can indicate that unmanned vehicle is
It is no to fall into in the area for considering air traffic control purpose.Environmental condition can include one or more environmental conditions in region.Example
Such as, when sending or receiving order, it may be considered that the environment complexity of unmanned vehicle peripheral region.It is contemplated that when sending or
The weather that unmanned vehicle is undergoing when receiving order.Order can occur a time point.
Can be with real-time update storage system.For example, when sending, receiving and/or performing order, they can be with
Any other information for carrying out self-information collection is recorded in storage system together.This can occur in real time.Can send,
Receive and/or it is exectorial be less than 10 minutes, 5 minutes, 3 minutes, 2 minutes, 1 minute, 30 seconds, 15 seconds, 10 seconds, 5 seconds, 3 seconds,
Any relevant information that stored command and information are concentrated in 1 second, 0.5 second or 0.1 second.Information collection can store in any way
Or it is recorded in storage system.Enter in information collection it is fashionable, can record described information collection without consider other specification, it is all
Such as user identity, unmanned vehicle identity or user-unmanned vehicle combination.Or, it may be considered that other specification and record it
.For example, it can be stored together for all information collection of same user.Even if information collection does not store all together, it
Can search for and/or can index, to find associated information.If for example, letter for specific user
Breath collection enters at different time points and recorded together with the information collection from other users, then information collection can be can search for
, to find all information collection associated with the user.
In the alternative, storage system can be without real-time update.Storage system can be with
Rule or irregular time interval and be updated periodically.For example, storage system can weekly, daily, per some
Hour, per hour, per half an hour, it is every 15 minutes, every 10 minutes, every 5 minutes, every 3 minutes, per minute, every 30 seconds, every 15 seconds,
Every 10 seconds, every five seconds for example or renewal per second.In some cases, renewal time table can be provided, the renewal time table can include
Rule or irregular renewal time.Renewal time table can be fixed, or can be modifiable.In certain situation
Under, renewal time table can be changed by the manipulator of storage system or manager.Renewal time table can be by certification system
The manipulator of system or manager's change.The user of unmanned vehicle or can can not change the renewal time
Table.The user of unmanned vehicle can change the renewal time table of the unmanned vehicle associated with the user.User
It can change the renewal time table that the user is authorized to the unmanned vehicle of operation.
Storage system can be updated in response to the event or the situation that detect.For example, work as memory storage system
During manipulator's solicited message of system, storage system can be asked or pulled from one or more external sources (for example, distant
Control device, unmanned vehicle, user) information collection.In another example, when situation (crash such as the detected) hair detected
When raw, storage system can ask or pull information collection.In some instances, one or more external source (examples
Such as, remote control, unmanned vehicle, user) can be to storage system pushed information collection.If for example, unmanned vehicle
The unmanned vehicle is detected close to flight restricted area, then the unmanned vehicle can push away to storage system
Deliver letters breath collection.In another example, if remote control or unmanned vehicle are recognized to there may be some interference wireless signals,
They can be to Memory Storage Unit pushed information collection.
One aspect of the present invention can be related to a kind of method of record unmanned vehicle (UAV) behavior, methods described bag
Include:Unmanned vehicle identifier is received, the unmanned vehicle identifier uniquely identifies out institute from other unmanned vehicles
State unmanned vehicle;User identifier is received, the user identifier uniquely identifies out the user from other users, its
Described in user one or more orders are provided via remote control to realize the operation of the unmanned vehicle;And at one
Or one or more of orders, associated with one or more of orders described are recorded in multiple Memory Storage Units
User identifier and the unmanned vehicle identifier associated with one or more of orders.Similarly, according to this
The embodiment of invention, a kind of the non-transient of programmed instruction for including and being used for recording unmanned vehicle (UAV) behavior can be provided
Computer-readable medium, the computer-readable medium include:For by user identifier and the one or more from user
The associated programmed instruction of order, wherein the user identifier uniquely identifies out the user from other users, and
Wherein described user provides one or more orders via remote control to realize the operation of the unmanned vehicle;For by nothing
People's aircraft identifier programmed instruction associated with one or more of orders, wherein the unmanned vehicle identifier from
The unmanned vehicle is uniquely identified out in other unmanned vehicles;And in one or more Memory Storage Units
It is middle record it is one or more of order, the user identifier associated with one or more of orders and with it is described
The programmed instruction of the associated unmanned vehicle identifier of one or more order.
According to the embodiment of the present invention, a kind of unmanned vehicle (UAV) behavior record system can be provided.The system
It can include:One or more Memory Storage Units;And one or more processors, it is operably coupled to described one
Individual or multiple Memory Storage Units and either individually or collectively it is configured for:Receive unmanned vehicle identifier, institute
State unmanned vehicle identifier and the unmanned vehicle is uniquely identified out from other unmanned vehicles;Receive user's mark
Symbol, the user identifier uniquely identifies out the user from other users, wherein the user carries via remote control
Ordered for one or more to realize the operation of the unmanned vehicle;And remember in one or more Memory Storage Units
Record it is one or more of order, the user identifier associated with one or more of orders and with it is one
Or the unmanned vehicle identifier that multiple orders are associated.
Information collection can be stored any a period of time by storage system.In some cases, can be indefinitely
Information collection is stored, until they are deleted.It can allow or can not allow to delete information collection.In some cases, can be with
Only the manipulator of storage system or manager is allowed to be interacted with the data being stored in storage system.
Under certain situation, the manipulator of Verification System (for example, air traffic control system, authentication center) can be only allowed to be deposited with being stored in memory
Data in storage system interact.
It is alternatively possible to described information collection is automatically deleted over time, become.The period can preestablish.Example
Such as, described information collection can be automatically deleted after more than predetermined amount of time.The example of predetermined amount of time can include but unlimited
In 20 years, 15 years, 12 years, 10 years, 7 years, 5 years, 4 years, 3 years, 2 years, 1 year, 9 months, 6 months, 3 months, 2 months, 1 month, 4
Week, 3 weeks, 2 weeks, 1 week, 4 days, 3 days, 2 days, 1 day, 18 hours, 12 hours, 6 hours, 3 hours, 1 hour, 30 minutes or 10 points
Clock.In some cases, only after a predetermined time period has elapsed, information collection can be just deleted manually.
Adapter control
In some embodiments, the operation of unmanned vehicle may be compromised.In one example, user can grasp
Make unmanned vehicle.Another user (for example, hijacker) can attempt adapter control unmanned vehicle in an unauthorized manner.
Systems and methods described herein can allow to detect such trial.Systems and methods described herein can also provide
The response attempted is kidnapped to such.In some embodiments, can analyze the information collected in storage system with
Detection is kidnapped.
Figure 12 shows that according to embodiment of the present invention, hijacker attempts showing for the scene of adapter control unmanned vehicle
Figure.User 1210 can send user command using user remote controller 1215 to unmanned vehicle 1220.Hijacker 1230 can
To be ordered using hijacker's remote control 1235 with sending hijacker to unmanned vehicle 1220.Hijacker's order can be disturbed
The user command.
In some embodiments, user 1210 can be the authorized user of unmanned vehicle 1220.User can be with
Unmanned vehicle has initial relation.User alternatively can carry out registered in advance to unmanned vehicle.User can kidnap
Person attempts to operate the unmanned vehicle before adapter control unmanned vehicle.In some cases, fly if user is nobody
The authorized user of row device, then the user can operate the unmanned vehicle.If user is not the warp of unmanned vehicle
Authorized user, then the user can be not allowed to operate the unmanned vehicle, or can operate institute in a manner of being relatively limited
State unmanned vehicle.
User identity can be authenticated.In some cases, can user operate unmanned vehicle before to
Family identity is authenticated.Can it is determined that user whether be unmanned vehicle authorized user prior to, concurrently with, or after to institute
User is stated to be authenticated.If user passes through certification, the user can operate unmanned vehicle.If user is without recognizing
Card, then the user can be not allowed to operate the unmanned vehicle, or can be operated in a manner of relatively limited it is described nobody
Aircraft.
User 1210 can control the operation of unmanned vehicle 1220 using user remote controller 1215.Remote control can obtain
Take family input.Remote control can transmit user command to unmanned vehicle.User command can be inputted and given birth to based on user
Into.User command can control the operation of unmanned vehicle.For example, user command can control the flight of unmanned vehicle
(for example, flight path, take off, land).User command can control operating, being one or more for one or more payload
The position of payload, the operating of one or more carriers, the operating of one or more sensors, one or more communication units
Operate, the operation of one or more navigation elements and/or the operation of one or more power cells.
In some cases, user command can persistently be sent to unmanned vehicle.Even if user does not lead at a time
It is dynamic that input is provided, or to keep present situation or sent out based on recently entering of being provided from the user to unmanned vehicle
Lose one's life order., can be with for example, if user's input includes the movement of control stick and user makes control stick be maintained at special angle
Flight orders are sent to unmanned vehicle based on the known control stick angle from previous movement.In some cases, can be with
User's input is persistently provided to remote control, even if user does not move actively or physically changed anything.For example, if user is defeated
Enter including remote control being tilted into particular pose and user does not adjust the posture set up, then can be obtained based on test constantly
To the remote control posture and persistently provide user input.For example, if remote control is angled within the period of extension
A, then during the period, user's input can be read as " posture of remote control is angle A ".Can be to unmanned vehicle
Flight orders are transmitted, the flight orders indicate the flight orders in response to " remote control is in angle A ".Can be with real-time update
For the user command of unmanned vehicle.User command can reflect less than 1 minute, 30 seconds, 15 seconds, 10 seconds, 5 seconds, 3 seconds, 2
User's input in second, 1 second, 0.5 second, 0.1 second, 0.05 second or 0.01 second.
Alternatively, without persistently sending user command to unmanned vehicle.Can be by rule or irregular time cycle
To send user command.For example, can less equal than per hour, it is every 30 minutes, every 15 minutes, every 10 minutes, every 5 points
Clock, every 3 minutes, per minute, every 30 seconds, every 15 seconds, every 10 seconds, every five seconds for example, it is every 3 seconds, every 2 seconds, every 1 second, every 0.5 second or every 0.1
User command is sent in second.User command can be sent according to timetable.Timetable may or may not be to change
's.User command can be sent in response to one or more events that detect or situation.
User command can be received by unmanned vehicle 1220.When the user command and hair that are received at unmanned vehicle
Send from the user command of user remote controller 1215 match when, the unmanned vehicle can be according to the order from user
And operate.When the order sent matches with the order received, the communication link between unmanned vehicle and remote control can
To be exercisable.If the order sent and the order received match, the order may be dropped.At some
In embodiment, if the order sent and the order received mismatch, the order may be dropped (for example, distant
Communication link between control device and unmanned vehicle may be dropped), or disturb order to have been sent from.
Hijacker 1230 can control the operation of unmanned vehicle 1220 using hijacker's remote control 1235.Remote control can
To obtain hijacker's input.Remote control can transmit hijacker's order to unmanned vehicle.Hijacker's order can be based on misfortune
What the person of holding inputted and generated.Hijacker orders the operation that can control unmanned vehicle.For example, hijacker's order can control nothing
The flight (for example, flight path, take off, land) of people's aircraft.Hijacker's order can control one or more payload
Operate, the position of one or more payload, the operating of one or more carriers, the operation of one or more sensors,
The operating of one or more communication units, the operation of one or more navigation elements and/or one or more power cells
Operation.
In some cases, hijacker's order can be persistently sent to unmanned vehicle.This can by similar to how to
The mode that unmanned vehicle persistently sends user command occurs.Or without persistently sending hijacker's order to unmanned vehicle.
How this is can be by similar to without occurring in the way of persistently sending user command to unmanned vehicle.It can be advised by rule or not
The time cycle of rule sends hijacker's order.Hijacker's order can be sent according to timetable.Can in response to one or
The multiple events detected or situation and send hijacker order.
Hijacker's order can be received by unmanned vehicle 1220.When the hijacker's order received at unmanned vehicle
With send from the hijacker of hijacker's remote control 1235 order match when, the unmanned vehicle can be according to from misfortune
The order for the person of holding and operate.When the order sent and the order received match, unmanned vehicle and hijacker's remote control
Between communication link can be exercisable.When the order that is received by unmanned vehicle with from hijacker's receiver controller
When the order sent matches, hijacker may successful adapter control unmanned vehicle.In some cases, when nobody flies
When row device is ordered according to hijacker and performs one or more operations, hijacker may successfully take over control unmanned flight
Device.When unmanned vehicle performs one or more operations not according to user command, hijacker may successfully take over.
When receiving hijacker's order at unmanned vehicle, unmanned vehicle can also receive or can not receive use
Family order.In a type of abduction, the communication link between unmanned vehicle and hijacker's remote control may interfere with described
Communication link between unmanned vehicle and user remote controller.This may prevent user command from reaching unmanned vehicle, Huo Zheke
User command only can unreliably be received by unmanned vehicle.Hijacker order can by or can not be by unmanned flight
Device receives.In some embodiments, when hijacker sends the order of adapter control unmanned vehicle, hijacker connects may
Disturb user's connection.In this scene, unmanned vehicle may only receive hijacker's order.Unmanned vehicle can be according to abduction
Person orders and operated.In another embodiment, when hijacker differs orientation unmanned vehicle transmission order, hijacker's connection
It may interfere with user's connection.The interference of signal can be enough to form the abduction to unmanned vehicle or the user to unmanned vehicle
The hacker attacks of operation.Unmanned vehicle alternatively can not receive any order (for example, can stop receiving what is be previously entered
User command).Unmanned vehicle can have one or more default-actions, when losing the communication with user, can occur
The default-action.For example, unmanned vehicle can be hovered with original place.In another example, unmanned vehicle, which can be back to, appoints
Business starting point.
In another type of abduction, unmanned vehicle can receive user command and hijacker's order.Unmanned flight
Communication link between device and hijacker's remote control is not necessarily required to disturb between the unmanned vehicle and user remote controller
Communication link.Unmanned vehicle can be ordered and operated according to hijacker.Unmanned vehicle can select to be ordered according to hijacker
And operate, and ignore user command.Or when unmanned vehicle receives more group commands constantly, the unmanned vehicle can be adopted
Take one or more default-actions.For example, unmanned vehicle can be hovered with original place.In another example, unmanned vehicle can be with
It is back to task starting point.
Hijacker can be the individual of uncommitted operation unmanned vehicle.Hijacker can be that unmanned vehicle is not entered
Row individual registered in advance.Hijacker can be that uncommitted taken over from user is controlled to operate the individual of unmanned vehicle.Can
By other means to be authorized hijacker to operate unmanned vehicle.However, when user has operated unmanned vehicle,
Hijacker can be not authorized to disturb the operation of the user.
Systems and methods described herein can include detection to one or more interference ordered from user.This
The abduction to unmanned vehicle can be included.When user command does not reach unmanned vehicle, the user command may be by
Interference.User command may be interfered due to the communication connection between unmanned vehicle and hijacker.In some cases,
Hijacker may attempt to disturb the signal between user and unmanned vehicle.Can be in response to the logical of hijacker and unmanned vehicle
Believe and signal interference occurs.Or hijacker with unmanned vehicle communication without disturbing between user and unmanned vehicle
Signal.For example, even if hijacker's device does not send any hijacker's order, hijacker's device, which can also broadcast, may interfere with
The signal of the communication of user and unmanned vehicle.Even if user command reaches unmanned vehicle, the user command also may can
It is interfered.If unmanned vehicle performs operation not according to user command, the user command may be interfered.Example
Such as, unmanned vehicle can select to perform operation according to hijacker's order rather than user command.Or unmanned vehicle can be with
Selection takes default-action or does not take action to replace user command.
Hijacker order can with or can not be contradicted with user command.Unwarranted communication, which may interfere with, to be come from
The one or more of the user of the order of contradiction are provided to unmanned vehicle to order.In one example, user command can be real
The flight of existing unmanned vehicle and hijacker's order can realize flight in a different manner.For example, user command can order
Unmanned vehicle turn right and hijacker order can order unmanned vehicle move on.User command can order unmanned flight
Device around pitch axis rotate and hijacker order can order unmanned vehicle around yaw axes rotate.
In addition to detecting and disturbing, this paper system and method can also allow in response to it is detecting, to from user
One or more orders interference and the action taken.The action can include alerting user on interference.It is described dynamic
Make to include alerting one or more other party (for example, manipulator or manager of Verification System) on interference.It is described dynamic
Make the one or more default-actions (for example, landing, original place hover, are back to starting point) that can include unmanned vehicle.
One aspect of the present invention is related to the method that user is alerted when the operation of unmanned vehicle is compromised, the side
Method includes:User is authenticated to realize the operation of unmanned vehicle;From receive user input remote control one or
It is multiple to order to realize the operation of unmanned vehicle;Detect one or more lives of the unwarranted, interference from the user
The communication of order;And via the remote control, the user is alerted on the unwarranted communication.In similar side
Face, a kind of the non-transient of programmed instruction for including and being used for that user to be alerted when the operation of unmanned vehicle is compromised can be provided
Computer-readable medium.The computer-readable medium can include:For being authenticated user to realize unmanned vehicle
Operation programmed instruction;For realizing unmanned vehicle from the one or more orders of remote control for receiving user's input
Operation programmed instruction;And the program for generating the warning to be supplied to the user via the remote control refers to
Order, unwarranted communication of the warning on one or more orders of the detected, interference from the user.
According to the embodiment of the present invention, a kind of unmanned vehicle warning system, the unmanned vehicle police can be provided
Announcement system includes:Communication module;And one or more processors, its be operably coupled to the communication module and individually
Ground is jointly configured for:User is authenticated to realize the operation of unmanned vehicle;From reception user's input
Remote control is one or more to order to realize the operation of unmanned vehicle;One or more from the user is disturbed in detection
The unwarranted communication of individual order;And signal is generated to be warned via the remote control on the unwarranted communication
Accuse the user.Unmanned vehicle alert module can include:One or more processors, it is either individually or collectively configured
Into for:User is authenticated to realize the operation of unmanned vehicle;From receive user input remote control one or
It is multiple to order to realize the operation of unmanned vehicle;One or more orders of the detection interference from the user are without permission
Communication;And signal is generated to alert the user on the unwarranted communication via the remote control.
Unwarranted communication, which can include hijacker, orders.Unwarranted communication can indicate that unwarranted use
The abduction at family is attempted.The one or more of operation that hijacker's order alternatively can include being used to control unmanned vehicle order
Order.Unwarranted communicate indicates that the signal interference of unauthorized user is attempted.Cause the unwarranted of signal interference
Communication need not include the hijacker's order for being used to control the operation of unmanned vehicle.
The warning on unwarranted communication can be generated.Can to attempt to operate the user of unmanned vehicle, to another
One individual (for example, the manipulator and/or manager of Verification System, the individual in law enforcement agency, individual of emergency service) and/or
Warning is provided to controlled entity.
Can visually, audibly and/or tactile warning is provided.For example, can be on the display screen of user remote controller
Warning is provided.For example, the text or image for indicating unwarranted communication can be provided.It can provide and indicate that there occurs right
The text or image of the interference of user command.In another example, warning can acoustically be provided via user remote controller.With
Family remote control can have the loudspeaker that can produce sound.Sound can indicate that unwarranted communication.Sound can indicate
Go out the interference to user command.Can via remote control and tactile warning is provided.User remote controller can be vibrated or beat.
Or user remote controller can be trembleed, heating or turn cold, deliver mild electrical shock or provide any other haptic indication.Tactile is imitated
Fruit can indicate that unwarranted communication.Haptic effect can indicate that the interference to user command.
Warning can indicate that the type of unwarranted communication.Can be from the one or more kind of unwarranted communication
The type of the unwarranted communication is selected in class.For example, unwarranted communication can be antagonism flight orders, signal
Communication, antagonism payload operational order or antagonism communication (for example, data transfer) order of interference.Warning can regarding
Different types of unwarranted communication is distinguished in feel.For example, different text and/or image can be provided.Warning can be
Acoustically distinguish different types of unwarranted communication.For example, different sound can be provided.Different sound can be not
Same words or different tones.Warning can distinguish different types of unwarranted communication in tactile.For example, it can make
With different vibration or bounce.
The various modes for detecting unwarranted communication can be realized.For example, when associated with unwarranted communication
When user identifier does not indicate the user through allowing to interact with unmanned vehicle without certification or, it can detect not
Authorized communication.For example, it is user that hijacker's possibility is not authenticated.In some cases, single hijacker can be extracted
Identifier.It can determine that hijacker's identifier is not the individual of authorized operation unmanned vehicle or is not authorized from user
Take over the individual of the control to operation.In some cases, hijacker can also be identified using key information.For example, can be with
Information of the extraction on hijacker's key in experience mark and/or verification process.Hijacker's key may not be with user key
Match.Hijacker cannot access the key of user.Therefore the hijacker can be identified as non-user.Hijacker's communication can
It is identified as non-user communication.In some cases, hijacker can not produce user identifier and/or user key.
Made comparisons when between the user command sent from remote control and/or the order received at unmanned vehicle
When, unwarranted communication can be detected.If not receiving user command at unmanned vehicle, one or more is dry
Disturbing unwarranted communication may have occurred and that.When unwarranted communication is reduced between user remote controller and unmanned vehicle
During the effect of communication channel, unwarranted communication can be detected.Can or can be not based on it is unwarranted communication and
The order of one or more contradictions is provided to unmanned vehicle.Fly for example, the order of one or more contradictions can be hijacker
Line command, hijacker's flight orders may contradict with user command.It can carry out receiving contradiction to unmanned vehicle
The detection of order.In other cases, the order of contradiction is not received at unmanned vehicle, and unmanned vehicle may not detect
To the order of contradiction.Not receiving the order sent from user can be enough to indicate that unwarranted communication has disturbed user
Order.
When being made comparisons between the user command that remote control is sent and the operation carried out by unmanned vehicle, Ke Yijian
Measure unwarranted communication.If unmanned vehicle does not act according to user command, one or more interference is without awarding
The communication of power may have occurred and that.This can occur in the first stage, wherein communication can occur in user remote controller and nobody
Between aircraft.This is likely to occur in second stage, and the stage receives order in unmanned vehicle and performed with unmanned vehicle
Between the time of order.The example of unwarranted communication type in the first stage is provided above.For in second stage
Unwarranted communication, user command can receive by unmanned vehicle.However, the order of alternative contradiction can also be by nothing
People's aircraft receives.Unmanned vehicle can operate according to the order of alternative contradiction.The order that user sends flies with nobody
Mismatch between the action of row device can indicate that unwarranted communication.In another example, unmanned vehicle can connect
The order of user command and alternative contradiction is received, but due to the conflict essence of order, it can not take action or can adopt
Take default-action.Action shortage or default-action can provide the mismatch between user command and the operation of unmanned vehicle.
In some cases, can analyze from storage system (for example, memory storage as illustrated in Figure 11
System) data to detect unwarranted communication.The data from one or more groups of information can be analyzed.In some embodiment party
In formula, the order for being stored in information concentration can be compared.For example, multipacket message can be stored, described information collection and user and nothing
Specific intercorrelation connection between people's aircraft.The multipacket message collection can include sent by remote control order, by nobody
The order and/or the order by unmanned vehicle execution that aircraft receives.If by the order that remote control is sent with being flown by nobody
Row device receive order match, then between user remote controller and unmanned vehicle communication produce disturb risk it is very low or
There is no risk.If mismatched by the order that remote control is sent with the order received by unmanned vehicle, to remote control and nothing
The risk that communication between people's aircraft produces interference is very high.If unmanned vehicle receives different orders or if nothing
People's aircraft does not receive order, then order may mismatch.If by the order that remote control is sent with being held by unmanned vehicle
Capable order matches, then the risk of unwarranted Communication Jamming user command is very low or without risk.If by remote control
The order and the operation of unmanned vehicle sent mismatches, then the risk of unwarranted interference user command is very high.At some
In the case of, the mistake that unmanned vehicle operates may occur in the case where no hijacker disturbs.For example, unmanned vehicle can
To receive user command, but can not can be performed according to the order.The life from storage system can be compared
Order or other data are to detect the interference to user command.
In some cases, the data such as order data can be pulled from single device without residing at storage
In device storage system.For example, user command data can be pulled from remote control and/or can be pulled from unmanned flight
The order data of device, and can be compared.
Hijacker can be the individual for taking over control unmanned vehicle from user without permission.However, in other cases,
Such as this paper, other are described everywhere, can allow adapter control.For example, the user with more high precedence or higher operation grade
It can take over control.The user can be management user.The user can be law enforcement agency member or emergency service
Member.The user can have such as other described any characteristics everywhere herein.Taken over when user is authorized to from initial user
During control, unmanned vehicle can have different reactions.Any description to authorized user herein is readily applicable to can
The autonomous or semiautonomous system of control unmanned vehicle is taken over from user.For example, computer can take over control in some cases
Unmanned vehicle processed, and unmanned vehicle can be operated according to one or more groups of codes, logic or instruction.Computer can be with
Unmanned vehicle is operated according to one group of air traffic control.
System can distinguish unwarranted adapter and authorized adapter.If adapter by authorizing, can be with
Authorized user is allowed to continue adapter control unmanned vehicle.When adapter is without authorizing, then nobody can be re-established
Communication between aircraft and initial user, the communication between unmanned vehicle and unauthorized user can be stopped, can be with
Warning is provided to one or more individuals, unmanned vehicle can take one or more acquiescence flight responses, and/or warp
The entity of mandate can adapter control unmanned vehicle.
The example for the scene that authorized adapter can occur is described herein.Unmanned vehicle can be sent comprising signature
Message.The message can include on each of flight control command, the GPS location of unmanned vehicle and/or temporal information
The information of type.Any other information of the operation on unmanned vehicle or unmanned vehicle can be sent (for example, can be with
Send the information on unmanned vehicle payload, the information of the positioning on unmanned vehicle payload, on using
The payload and the information of the data that are collected into, on unmanned vehicle one or more sensors information, on
The information for the data being collected into using one or more of sensors, on unmanned vehicle communication information, on
The information or any other information that the information of the navigation of unmanned vehicle, the electricity on unmanned vehicle use).At some
In the case of, message can be received by air traffic control system.
It is limited that if air traffic control system finds that unmanned vehicle enters from the information of unmanned vehicle transmission (for example, broadcast)
Region, then air traffic control system can warn the unmanned vehicle or dissuade unmanned vehicle continuation activity in this region from.Can
With by means of or can without the help of such as herein other described geography fence device determines confined area everywhere.It is limited
Region can be alternatively the volume assigned or the space of assigned area top.User can not be authorized to manipulation, and nobody flies
Row device enters in confined area.Unmanned vehicle can not be authorized into confined area.In some embodiments, it is any nobody
Aircraft is all not authorized to enter confined area.Or some unmanned vehicles can be authorized into confined area, but the area
Domain may be limited only to the unmanned vehicle by user's control.
It can send and warn to user via the communication connection between air traffic control system and user.For example, can be to
Send and warn with the user remote controller that user interacts.User can operate institute when unmanned vehicle enters confined area
State the individual of unmanned vehicle.Alternatively, it can also send and warn to unmanned vehicle first, the warning is then via nobody
Communication connection between aircraft and user and be sent to user.Any middle device or network can be used to warn to relay
To user.If therefore user does not interrupt the unwarranted flight of unmanned vehicle, air traffic control system can take over the nothing
People's aircraft.Unmanned vehicle can be given for a period of time to allow the unmanned vehicle to leave confined area.If nobody
Aircraft does not leave confined area within the period, then air traffic control system can take over behaviour of the control to the unmanned vehicle
Make.If unmanned vehicle continues to travel further into confined area and do not start steering, air traffic control system can take over control
Operation to the unmanned vehicle.Any description for entering limited area to unmanned vehicle herein goes for being in pin
To any other activity of unwarranted unmanned vehicle under one group of air traffic control of unmanned vehicle.For example, this can be with
During including in being located at the region for not allowing photography when unmanned vehicle, the unmanned vehicle collects image with camera.Can be with
Similarly warning is sent to unmanned vehicle.Can or can not air traffic control system adapter before give the unmanned flight
Some times of device observe.
After the process for starting adapter control, air traffic control system can be remotely controlled using digital signature with being sent to unmanned vehicle
Order.Such guidance command can have the reliable digital signature and digital certificate of air traffic control system, and it can prevent from forging
Control command.The digital signature and digital certificate of air traffic control system can not be forged.
The flight control units of unmanned vehicle can identify the guidance command from air traffic control system.From air traffic control system
The priority of guidance command can be configured to the priority higher than the guidance command from user.Therefore, air traffic control system can be located
In the operation grade than user Geng Gao.These orders from air traffic control system can be recorded by authentication center.Unmanned vehicle
Original user also can be notified that the order from air traffic control system.The original user can be notified that air traffic control system is taken over.It is former
Beginning user could be aware that or can be unaware of the details that unmanned vehicle how is controlled on air traffic control system.In some embodiment party
In formula, user remote controller can show the information of unmanned vehicle how is controlled on air traffic control system.For example, work as air traffic control system control
During unmanned vehicle processed, the data such as positioning of unmanned vehicle can be shown in real time on a remote control.From air traffic control system
Order can by air traffic control system manipulator provide.For example, air traffic control system, which can utilize, has adapter control unmanned vehicle
Ability one or more management users.In other cases, can be in the case of without human intervention by means of one
Or multiple processors and automatically provide the order from air traffic control system.Can according to one or more parameters, by means of one or
Multiple processors generate the order.If for example, unmanned vehicle enter the unmanned vehicle unauthorized entry into
Confined area, then the one or more processors of air traffic control system can generate leaves the restricted area for the unmanned vehicle
Make a return voyage in domain.In another example, air traffic control system can generate the path for starting landing for unmanned vehicle.
Air traffic control system can guide unmanned vehicle to leave confined area.Then, control can be given back to original use
Family.Or air traffic control system can allow unmanned vehicle suitably to land.Therefore, authorized connect can be allowed in each scene
Pipe.In contrast, unwarranted adapter can be detected.It can take as other are described to without permission everywhere herein
Adapter one or more responses.For example, authorized entity can take over control from unwarranted hijacker, nobody flies
Row device.Air traffic control system may be at the operation grade than unwarranted hijacker Geng Gao.Air traffic control system can from without
The hijacker of mandate takes over control unmanned vehicle.In some embodiments, higher operation etc. can be awarded in air traffic control system
Level.Or high operation grade can be awarded in air traffic control system, and one or more government entities can have higher operation etc.
Level.Air traffic control system can have the operation grade higher than all private users.
The deviation of unmanned vehicle behavior can be detected.The deviation of unmanned vehicle behavior is probably due to one or more
Hijacker's is movable and generation.The deviation of unmanned vehicle behavior is probably due to unmanned vehicle and/or user remote controller
Failure and occur.In one example, unmanned vehicle behavior can include flight.Herein to unmanned vehicle flight
Any description of deviation goes for the deviation of the unmanned vehicle behavior of any other type, such as payload behavior,
The deviation that payload positioning, carrier operation, sensor operations, communication, navigation and/or electricity use.
Figure 13 shows the example of the unmanned vehicle flight deviation according to embodiment of the present invention.Unmanned vehicle 1300 can
With the travel path 1310 with prediction.However, the Actual path 1320 of unmanned vehicle can be differently configured from predicted path.At certain
At one time point, it may be determined that the predicted position 1330 of unmanned vehicle.However, the physical location 1340 of unmanned vehicle can be with
It is different.In some embodiments, it may be determined that the distance between predicted position and physical location d.
The predicted path 1310 that unmanned vehicle is advanced can be determined.Data from user remote controller are determined for
Information on predicted path.For example, user can to remote control provide input, and remote control can be based on user input and
One or more flight orders are provided to unmanned vehicle.Flight orders from remote control can be flown by unmanned vehicle and be controlled
Unit processed receives, and the flight control units can send one or more control signals with reality to unmanned vehicle propulsion unit
The existing flight orders.In some embodiments, the one or more flight orders sent by remote control are determined for
The predicted path of unmanned vehicle.For example, if flight orders order unmanned vehicle continues straight forward, it can be desirable to pre-
Path is surveyed to continue to straight forward.During predicted path is calculated, it may be considered that posture/direction of unmanned vehicle.
Flight orders can cause the maintenance or adjustment to unmanned vehicle direction, and this can be used for influenceing flight path.
At any given time point, the predicted position 1330 of unmanned vehicle can be determined based on predicted path.
During predicted position is calculated, it may be considered that the prediction movement of unmanned vehicle, such as predetermined speed and/or prediction accelerate
Degree.Such as, if it is determined that predicted path be straight forward and the speed of unmanned vehicle keep stable, then can calculate pre-
Location is put.
The Actual path 1320 that unmanned vehicle is advanced can be determined.Data from one or more sensors can be used
In it is determined that information on Actual path.For example, unmanned vehicle can have one or more Airborne GPS sensors, it is described
GPS sensor can be used for the coordinate for determining unmanned vehicle in real time.In another example, unmanned vehicle can use one
Or multiple inertial sensors, vision sensor and/or sonac provide the navigation to unmanned vehicle.It can realize more
Sensor is merged to determine the position of unmanned vehicle.At any given time point, sensing data can be based on come really
Determine the physical location 1340 of unmanned vehicle.Unmanned vehicle can carry one or more sensors, and such as other are each herein
Those sensors of place description.One or more of described sensor can be other described any biographies everywhere herein
Sensor.In some cases, the data from airborne sensor are determined for Actual path and/or the position of unmanned vehicle
Put.In some cases, one or more machine outer sensors are determined for Actual path and/or the position of unmanned vehicle
Put.For example, multiple cameras can be provided in known position and can catch the image of unmanned vehicle.It can analyze described
Image is to detect the position of unmanned vehicle.In some cases, the sensor on unmanned vehicle machine and unmanned vehicle machine
The combination of outer sensor is determined for Actual path and/or the position of unmanned vehicle.One or more of sensings
Device can operate independently of unmanned vehicle and can alternatively can not be by user's control.One or more of sensors
It can be located on unmanned vehicle machine or outside unmanned vehicle machine, while still be operated independently of unmanned vehicle.For example, nobody
Aircraft can have the GPS tracks of device that user may not control.
The gap d between the predicted position of unmanned vehicle and the physical location of unmanned vehicle can be determined.At some
In the case of, distance d can be calculated by means of one or more processors.Unmanned vehicle predicted position and nobody can be calculated
Coordinate difference between aerocraft real position.Coordinate can be provided as world coordinates.Or coordinate can be provided as part
Coordinate and one or more conversions can be carried out to global coordinate system or to same local coordinate system.
One or more processors for determining the gap can be located at unmanned vehicle machine, on remote control or
Person may be provided on outside unmanned vehicle and remote control.In some cases, one or more of processors can be empty
A part for guard system or any other part of Verification System.In some embodiments, one or more of processors
It can be a part for flight supervision module, air traffic control module or traffic administration module.
In one example, the order from remote control can be transferred into unmanned vehicle and can also be examined by air traffic control system
Survey.Air traffic control system can receive order directly from remote control or via one or more middle devices or network.Memory
Storage system (for example, storage system in Figure 11) can receive order.Storage system can be blank pipe system
A part for system can be accessed by air traffic control system.Number from sensor (on unmanned vehicle machine and/or outside machine)
According to can be received by air traffic control system.Air traffic control system can directly from sensor, via unmanned vehicle or via in any other
Between device or network receive sensing data.Storage system can receive or can not receive sensing data.
In some embodiments, to there may be some between the predicted path and Actual path of unmanned vehicle naturally inclined
Difference.However, when deviation is larger, due to kidnap or failure or any other harm to unmanned vehicle and the inclined of increase be present
Poor possibility.This goes for any kind of unmanned vehicle Deviant behavior and is not necessarily limited to fly.In certain situation
Under, it can be estimated that distance d with determine kidnap failure or to unmanned vehicle any other harm risk.Institute can be based on
Distance is stated to determine that risk indicates.In some cases, risk instruction can be that the binary of risk is indicated (for example, risk is deposited
Still it is being not present).For example, if distance is maintained at below predetermined value, risk instruction can not be provided.If distance exceedes
Predetermined value, then it can provide and the risk of abduction or failure is indicated.In other cases, risk can be indicated to be provided as one
Or multiple species or level.For example, if distance meets or exceeds first threshold, excessive risk level can be indicated.If away from
From falling between first threshold and relatively low Second Threshold, then medium risk level can be indicated.If distance falls in the second threshold
Value is following, then can indicate low-risk level.In some cases, risk level can be substantially continuous, or can be with
With many types.For example, risk instruction can be quantitative.Distance can be based on and percentage risk is provided.For example, it is based on
Deviation, 74% abduction or failure risk can be provided.
In some cases, deviation can be the single factor so as to providing risk instruction.In other embodiments, with
The other factors that deviation is combined are determined for the risk to be presented instruction.For example, under first group of environmental condition, it is specific
The deviation of distance can indicate that unmanned vehicle is compromised the excessive risk of (for example, kidnapping, failure), and in second group of environment
Under the conditions of, identical specific range can indicate that the low-risk that unmanned vehicle is compromised.For example, at calm one day,
It can indicate that away from 10 meters of deviation of predicted position and have occurred and that some form of abduction or failure.However, at one day that has wind,
The risk of relatively low abduction or failure can be presented in 10 meters of deviation, because wind will cause the deviation of flight path more has can
Energy.
It is determined that during risk indicates it is contemplated that factor can include environmental condition (for example, amblent air temperature (wind,
Precipitation, temperature), the magnitude of traffic flow, environment complexity, obstacle), the movement (for example, speed, acceleration) of unmanned vehicle, communication
Condition (for example, signal intensity, blackout or there is interference signal), the sensitivity (example of unmanned vehicle type
Such as, turn, stability) or any other factor.
The risk instruction that unmanned vehicle does not operate according to one or more flight orders can be provided.This can include
The degree of risk that unmanned vehicle is endangered.This can include flight operation, payload operation, carrier operation, sensor behaviour
Make, communicate, navigating, electricity uses or the unmanned vehicle of any other type described herein operates.Unmanned vehicle row
For relatively large deviation can correspond to unmanned vehicle not according to one or more flight orders operate high risk degree.
In some embodiments, the Deviation Type of unmanned vehicle behavior is assessed to determine degree of risk.For example, unmanned vehicle flies
Row deviation can and the deviation of payload activity treat with a certain discrimination.In some embodiments, it is possible to distinguish treat unmanned flight
The position deviation of device and the velocity deviation of unmanned vehicle.
The aspect of the present invention can be related to a kind of method for the flight deviation for detecting unmanned vehicle, and methods described includes:
The one or more flight orders provided by user from remote control are provided;By means of one or more processors, based on described one
Individual or multiple flight orders and calculate the predicted position of the unmanned vehicle;By means of one or more sensors to detect
State the physical location of unmanned vehicle;The predicted position and the physical location are compared to determine the unmanned flight
The deviation of device behavior;And deviation based on the unmanned vehicle behavior and provide the unmanned vehicle not according to described one
Individual or multiple flight orders and operate risk instruction.It is used to detect flying for unmanned vehicle furthermore it is possible to provide a kind of include
The non-transient computer-readable media of the programmed instruction of row deviation, the computer-readable medium include:For based on by user
The programmed instruction of the predicted position of the unmanned vehicle is calculated from one or more flight orders of remote control offer;For
The programmed instruction of the physical location of the unmanned vehicle is detected by means of one or more sensors;For by the prediction
Position is compared to determine the programmed instruction of the unmanned vehicle Deviant behavior with the physical location;And for based on
The unmanned vehicle Deviant behavior and the unmanned vehicle is provided and not operated according to one or more of flight orders
Risk instruction programmed instruction.
According to the embodiment of the present invention, a kind of unmanned vehicle flight deviation detecting system can be provided.The flight
Offset detection system can include:Communication module;And one or more processors, it is operably coupled to the communication mould
Block and either individually or collectively it is configured for:The one or more flight orders provided by user from remote control are provided;
The predicted position of the unmanned vehicle is calculated based on one or more of flight orders;Sensed by means of one or more
Device detects the physical location of the unmanned vehicle;The predicted position and the physical location are compared to determine institute
State the deviation of unmanned vehicle behavior;And generation signal with provided based on the unmanned vehicle Deviant behavior it is described nobody
The risk instruction that aircraft does not operate according to one or more of flight orders.A kind of unmanned vehicle flight deviation detection
Module can include:One or more processors, it is either individually or collectively configured for:Receive by user from remote control
One or more flight orders of offer;The prediction of the unmanned vehicle is calculated based on one or more of flight orders
Position;The physical location of the unmanned vehicle is detected by means of one or more sensors;By the predicted position and institute
State the deviation that physical location is compared to determine the unmanned vehicle behavior;And generation signal with based on it is described nobody fly
Row device Deviant behavior and the risk instruction that the unmanned vehicle do not operate according to one or more of flight orders is provided.
Risk instruction can be provided by way of caution.Warning can be provided a user via the remote control of user.User can be with
Then it can select to take action according to risk instruction.There is provided to the mutually separated air traffic control system of remote control and unmanned vehicle
Risk indicates.Air traffic control system then can determine whether to take action according to risk instruction.For example, air traffic control system can be with
Adapter control unmanned vehicle.Air traffic control system can require that user confirms institute before adapter control unmanned vehicle is determined whether
State whether user is still controlling the unmanned vehicle.For example, if user confirms unmanned vehicle according to the user
Order and operate, then air traffic control system can determine not take over the control unmanned vehicle.If user is unconfirmed, nobody flies
Row device operates according to the order of the user, then air traffic control system can take over the control unmanned vehicle.
In some embodiments, risk instruction can be presented to unmanned vehicle itself.Unmanned vehicle can make one
Individual or multiple airborne agreements are in place, and one or more of airborne agreements can initiate the one or more acquiescence from unmanned vehicle
Flight response.For example, if unmanned vehicle receives the report that its flight control is compromised, the unmanned vehicle can
With automatic start landing sequence, original place hovering or it can fly in holding patterrn automatically, task can be automatically returned to
Point can fly to specified " going home " position automatically.In some embodiments, the starting point of task can be that nobody flies
The position that row device takes off." going home " position can be one group of coordinate that is predetermined, being stored in unmanned vehicle memory.
Under certain situation, the starting point of task can be arranged to position of going home.In some cases, position of going home can be user or use
The position of family remote control.Even if user moves around, the position of going home of remote control can also be updated and unmanned vehicle
It can find remote control.In some cases, user can be manually entered to go home and coordinate or be appointed as street address
Go home place.Unmanned vehicle can stop the order from external source while the flight responder of experience acquiescence.One
In the case of a little, unmanned vehicle can stop the order from private user while the flight responder of experience acquiescence.
Unmanned vehicle can or can not experience acquiescence flight responder while stop come from air traffic control system or control
The order of entity processed.
The risk instruction that unmanned vehicle does not operate according to one or more flight orders can include flying on nobody
The information of row device Harm Type.For example, the risk instruction that unmanned vehicle does not operate according to one or more flight orders can
Indicated with the risk being held as a hostage including unmanned vehicle.In another example, unmanned vehicle does not fly according to one or more
The risk instruction ordered and operated can include the risk instruction that the signal from remote control is interfered.In another example,
The risk instruction that unmanned vehicle does not operate according to one or more flight orders can include occurring on unmanned vehicle machine
The risk instruction of failure.Warning can transmit the information on unmanned vehicle Harm Type.Warning can be transmitted on risk
The information of degree.Warning can transmit the information of the degree of risk on being endangered for various types of unmanned vehicles.For example,
Warning can indicate that produces some form of harm possibility be 90%, and harm have 85% probability be due to abduction
Caused by and, the probability that harm has 15% be due to Communication Jamming and caused by, and it is due to nobody that harm, which has 0% probability,
Failure on aircraft machine and caused by.
If the order received by unmanned vehicle is different from by remote control and the order sent, the risk kidnapped can
Can be higher.If the order received by unmanned vehicle is the order to be omitted in the order that sends by remote control, communicate
The risk of interference may be higher.If ordered by what unmanned vehicle received with being matched by remote control and the order sent,
But unmanned vehicle is operated not according to received order, then the risk of failure may be higher on machine.
Any description to abduction is readily applicable to hacker attacks herein.Hacker can intercept and capture pass to unmanned vehicle or
The one or more communications sent from unmanned vehicle.Hacker can intercept and capture the data collected by unmanned vehicle.Hacker can be with
Intercept and capture the data of one or more sensors or payload from unmanned vehicle.For example, hacker can be intercepted and captured from nothing
The data of image capture device on people's aircraft machine.Therefore hacker can attempt to steal obtained data.Hacker can be because
This invades the privacy of the manipulator of unmanned vehicle.Hacker can also intercept and capture the communication for passing to unmanned vehicle.For example, hacker can
To intercept and capture one or more orders from user remote controller to unmanned vehicle.Hacker can intercept and capture order to determine unmanned flight
How device will run.Hacker can use intercepted and captured order to determine that (otherwise the position can for the position of unmanned vehicle
To be unconspicuous) or unmanned vehicle other activities.
Intercepting and capturing of the hacker to communication (up-link or downlink) may not disturb the remainder of communication.For example, work as
When hacker intercepts and captures the image stream from unmanned vehicle, the intended recipient of image still can receive image.Intended recipient
Otherwise intercepting and capturing may be unaware of and had occurred and that.Or the intercepting and capturing of communication may interfere with the remainder of communication.Example
Such as, when image is trapped, the expection recipient of image may not receive image.Systems and methods described herein can be with
Help to detect and/or prevent hacker attacks.
For example, carrying out with that may need to carry out device before any communication of all parts of unmanned vehicle system
Certification.For example, it may need to be authenticated device before the communication from unmanned vehicle and/or remote control is received.Only
Have when device is authorized to and receives communication, described device can just receive communication.Hacker can be not authorized to receive communication, and therefore
It can not receive communication.Similarly, if hacker attempts to send the replacement communication of falseness, the identity of hacker may not be right
In authorized user and it should can prevent hacker from sending the communication of falseness.Similarly, if send false communication or from
Unauthorized user sends the trial of false communication, then can provide warning to authorized user.In some embodiments
In, communication can be encrypted.In some cases, only authorized user and/or certified user can
Communication to encryption is decrypted.For example, even if hacker wants communication interception, the hacker can not may also solve to communication
Close and deciphering.In some embodiments, decryption can require the key of user, and the key can be merely stored in authorized
In the physical storage of device.Therefore, hacker is likely difficult to attempt the copy of acquisition key and/or attempts to be disguised as through awarding
The user of power.
Individuation is evaluated
The activity of user and/or unmanned vehicle can be evaluated.For example, the work of the user of unmanned vehicle can be evaluated
It is dynamic.Because user can uniquely can identify, so the activity of user can be tied to unique user identity.Therefore, by
The activity that same user performs can be associated with the user.In one example, the activity of user can be with the user
Previous aerial mission is relevant.Various tests, proof or Training Practicing can also be associated with user.The activity of user can be with
Refer to the operation of any unmanned vehicle unsuccessfully attempted, disturb another user that user carries out to participate in task and/
Or intercepting and capturing and the communication of the unmanned vehicle of another user.In some embodiments, can be identified by activity and user
The user is authenticated before symbol is associated.
The activity of unmanned vehicle can be evaluated.Unmanned vehicle can uniquely can also identify, and unmanned flight
The activity of device can be tied to unique unmanned vehicle identity.Therefore, the activity performed by same unmanned vehicle can be with
The unmanned vehicle is associated.In one example, the activity of unmanned vehicle can be previous with the unmanned vehicle
Aerial mission is relevant.Various maintenance activities, diagnosis or proof can also be associated with unmanned vehicle.The activity of unmanned vehicle
Any mistake, failure or accident can also be included.In some embodiments, can by activity with unmanned vehicle identifier
The unmanned vehicle is authenticated before associated.
The one or more activity of user and/or unmanned vehicle can be evaluated.In some cases, evaluation can include
Qualitative evaluation is provided.For example, on user or unmanned vehicle any movable one or more records can with user or
The corresponding activity of unmanned vehicle and/or user or unmanned vehicle is associated.Fly for example, if accident relate to nobody
Row device, then on the accident, how accident occurs, mistake is attributed to who record can be related to the unmanned vehicle
Connection.In another example, if user had previously performed many aerial missions and in different landform under high wind speed
Success is navigated, then can provide the record on these achievements.The evaluation of a kind of or multiclass can be with user and/or the user
Corresponding activity is associated.For example, if user completes many difficult tasks, user can have associated with the user
The evaluation of " expert user ".If unmanned vehicle undergoes many failures or mistake, unmanned vehicle can have with it is described
The evaluation of unmanned vehicle associated " high failure risk ".
In some cases, evaluation can include providing quantitative assessment.For example, user and/or unmanned vehicle activity can
To receive grading, such as alphabetical rank or numerical value grading.Grading can on any activity of user or unmanned vehicle, and
Can be associated with the corresponding activity of user or unmanned vehicle and/or user or unmanned vehicle.For example, when user is complete
During into task, user can receive shows grading how or fraction on the user during task.For example, for first
Task, user can receive 7.5 gradings, and for the second task, it can receive 9.8 gradings, and this shows that user may be
Show more preferably during two tasks.The other factors such as task difficulty can play a role.In some cases, for success
Being more difficult to for task is completed, user can receive higher grading.In another example, user can undergo skills tests or proof
Test, and can receive and indicate user shows numerical score how.Unmanned vehicle can according to task complete how
And receive grading.For example, do not broken down during task compared to unmanned vehicle, if the unmanned vehicle is in task
Period breaks down, then the unmanned vehicle can receive lower grading.Do not suffer from periodically tieing up compared to unmanned vehicle
Shield, if the unmanned vehicle experiencings periodic maintenance, the unmanned vehicle grading can be higher.
When user and/or unmanned vehicle successfully complete activity with active mode, the user and/or unmanned vehicle
There can be higher overall grading.When user and/or unmanned vehicle be not successfully completed activity or carry out be probably can
During doubtful behavior, the user and/or unmanned vehicle can have relatively low overall grading.Therefore, user and/or nobody fly
Row device can have the movable reputation based on user and/or unmanned vehicle.
In some embodiments, evaluation system can provide one group of evaluation for user and/or unmanned vehicle.Institute
Commentary valency can automatically determine evaluation (for example, qualitative evaluation and/or quantitative assessment) by means of one or more processors, and
Without human interaction.Can be according to one or more parameters or algorithm and on the movable of user and/or unmanned vehicle
Data determine the evaluation.For example, successfully completing every time for task can carry user and/or unmanned vehicle evaluation automatically
Up to more positive result.User and/or unmanned vehicle evaluation can be automatically decreased to by failing every time for task or crash
More passive result.Therefore the evaluation can be objective.
Alternatively or additionally, evaluation can be provided by one or more human users.For example, user can evaluate he or
Herself.User can evaluate the unmanned vehicle that the user manipulates.In other cases, the peer of user can evaluate him
Or she.Peer can evaluate the unmanned vehicle manipulated by user.For example, the first user can operate the first unmanned flight
Device.Second user can observe the first user and notice that the first user is carrying out bad flight behavior (for example, direction
The unmanned vehicle surprise attack of second user or threatening second user).Second user can provide the passiveness to the first user
Evaluation.In another example, second user is observed that the first user is carrying out positive flight behavior (for example, performing
Difficult maneuvering flight, help second user) and the Positive evaluation to the first user can be provided.
User and/or unmanned vehicle evaluation can be checked by other users.For example, the first user can check the second use
The overall assessment at family and vice versa.User can check the user evaluation of oneself.User can take measures to try
Figure improves the grading of user.In some embodiments, only when user's evaluation reaches threshold level, system can just allow
The activity of the user.For example, only when user's evaluation reaches threshold level, the user can just grasp in some regions
Make.Only when user is rated 7.0 or higher, user can just manipulate unmanned vehicle in some regions.Flight restriction
Level can depend on user and/or unmanned vehicle is evaluated.In some cases, user and/or unmanned vehicle evaluation can
To indicate user type and/or unmanned vehicle type, or vice versa., can when user has higher user's evaluation
To provide relatively low flight restriction level, and when user has relatively low user's evaluation, higher flight restriction can be provided
It is horizontal.When user has relatively low user's evaluation, one group of air traffic control for the user can be more strict, and works as and use
When family has higher user's evaluation, one group of air traffic control for the user can be with less stringent.When unmanned flight's utensil
When having higher unmanned vehicle evaluation, it is horizontal to provide relatively low flight restriction, and when unmanned vehicle have it is relatively low
When unmanned vehicle is evaluated, it is horizontal that higher flight restriction can be provided.When unmanned vehicle has lower unmanned vehicle
During evaluation, one group of air traffic control for the unmanned vehicle can be more strict, and when unmanned vehicle is with higher
When unmanned vehicle is evaluated, one group of air traffic control for the unmanned vehicle can be with less stringent.
Flight monitoring
It can be desirable to air traffic control system knows unmanned vehicle position.Unmanned vehicle can send position letter to air traffic control system
Breath.In some cases, for guarantee and/or security purpose, it is preferable to allow unmanned vehicle report position information.Nothing
People's aircraft regularly and on one's own initiative can report its current location and navigation channel to air traffic control system.However, in some cases,
Unmanned vehicle can not observe report.This can lose between unmanned vehicle and air traffic control system communicates or unmanned flight
Device may maliciously conceal information intentionally or occur when providing false (forging) information.Air traffic control system can be in its directorial area
Logger is disposed in domain to monitor the state of unmanned vehicle.One or more loggers can be disposed to monitor unmanned vehicle
Activity.
Figure 14 shows the example of the monitoring system using one or more loggers according to embodiment of the present invention.Nobody
Aircraft 1410 can be provided in environment.The environment can be in the region by air traffic control system management.Can be by blank pipe
One or more loggers are provided in the region of system administration (for example, logger A 1420a, logger B 1420b, logger C
1420c……).Supervising device or system 1430 can receive the information collected from one or more loggers.In some realities
Apply in mode, monitoring system can be air traffic control system.
In some embodiments, air traffic control system can be used for managing whole unmanned vehicle flight system.By blank pipe system
The region of reason under the overall leadership can be the whole world.In other cases, can be limited by the region of air traffic control system management.By blank pipe
The region of system administration can be based on administrative area.For example, air traffic control system can manage whole administrative area (for example, country,
State/province and district area, city, town, village or any other administrative area) in unmanned vehicle flight system.Different air traffic control systems can be with
Manage different regions.The size in region can be similar or can be different.
Unmanned vehicle 1410 can send can be monitored by one or more logger 1420a, 1420b, 1420c one
Or multiple message.Message from unmanned vehicle can include signature.In some cases, the message from unmanned vehicle
Can include for unmanned vehicle unique identification information (for example, unmanned vehicle identifier and/or unmanned vehicle
Key information).Identification information can uniquely identify and distinguish the unmanned vehicle from other unmanned vehicles.Come from
The message of unmanned vehicle can include any other information, the information, unmanned vehicle such as on flight control command
GPS location (or other positions information for unmanned vehicle) and/or temporal information.Described information can include being directed to
The positional information (for example, GPS information) of unmanned vehicle.Temporal information can include formulating and/or the time of transmission message.Can
The time is provided with clock according to unmanned vehicle.
The signal obtained from these loggers 1420a, 1420b, 1420c can stamp timestamp and in air traffic control system
Collect in 1430.Carrying out the data of self-recorder can be stored in storage system.Storage system can be empty
A part for guard system be able to can be accessed by air traffic control system.Air traffic control system can analyze the letter from data logger
Breath.Therefore, air traffic control system can collect the history control information of unmanned vehicle, and flight information and unmanned vehicle
Claim GPS flight paths.Air traffic control system can collect the operation data on unmanned vehicle, and the operation data can wrap
Include be sent to unmanned vehicle order, by unmanned vehicle receive order, unmanned vehicle perform action and on
The unmanned vehicle position of the information of unmanned vehicle, such as different time points.
In some embodiments, unmanned vehicle can be with air traffic control system direct communication and/or directly to storage
Device storage system provides information.Or unmanned vehicle can be with one or more logger direct communications, the logger can
To be communicated with air traffic control system and/or storage system.In some cases, the information on unmanned vehicle can be through
Air traffic control system is relayed to by one or more loggers.In some cases, logger can be provided and sent out to air traffic control system
Deliver to the associated additional data of the information of unmanned vehicle.
Air traffic control system can determine the position of unmanned vehicle with analysis time data.One aspect of the present invention can relate to
And a kind of method for the position for determining unmanned vehicle, methods described include:At multiple loggers receive from it is described nobody
One or more message of aircraft;It is one or more message from the unmanned vehicle at the multiple logger
Stamp timestamp;And by means of one or more processors, the timestamp based on one or more of message and calculate institute
State the position of unmanned vehicle.A kind of the non-transient of programmed instruction for the position for including and being used to determine unmanned vehicle can be provided
Computer-readable medium, the computer-readable medium include:The unmanned flight is come from for being received at multiple loggers
The programmed instruction of one or more message of device;For being one from the unmanned vehicle at the multiple logger
Or multiple message stamp the programmed instruction of timestamp;And calculate institute for the timestamp based on one or more of message
State the programmed instruction of the position of unmanned vehicle.A kind of unmanned vehicle communication position system can include:Communication module;And
One or more processors, its be operably coupled to the communication module and be either individually or collectively configured to be based on from
One or more message that the unmanned vehicle sends and received at multiple loggers away from the unmanned vehicle
Timestamp and calculate the position of the unmanned vehicle.
In an example of unmanned vehicle position is analyzed based on time data, from the signal of different loggers transmission
Time difference be determined for the rough position of unmanned vehicle, the different loggers, which are collected, comes from same unmanned vehicle
Same message.For example, if two loggers all receive the signal sent from specific unmanned vehicle, according to the record
The time difference of device reception signal, it is known that unmanned vehicle is being formed by time difference measuring and described two logger positions
On hyperbola.During formation is hyp, two, three or more logger can be used.Therefore, can be along double
Curve claims the rough position of unmanned vehicle.Timestamp can be stamped when signal leaves unmanned vehicle, and when letter
Number reach logger when can stamp timestamp.Such information can be used for calculating the time difference.
In another example, multiple loggers can be from unmanned vehicle reception signal, and can determine the time difference.When
Between poor example can be that unmanned vehicle sends time difference between signal and logger reception signal.In some cases,
When sending signal to one or more loggers, unmanned vehicle can be that the signal stamps timestamp.Work as reception signal
When, one or more loggers can beat timestamp.Time difference between two timestamps can indicate that signal reaches record
The traveling time of device.Traveling time can be related to the rough distance from unmanned vehicle to logger.For example, compared to traveling
Time is longer, if traveling time is shorter, unmanned vehicle can be closer to logger.If multiple loggers show difference
Traveling time, then unmanned vehicle can be closer to showing the logger of smaller traveling time.If for example, unmanned vehicle
Further away from logger, then it can be desirable to the traveling time of signal is longer.Traveling time can be small chronomere.Example
Such as, traveling time can be in the magnitude of second, millisecond, microsecond or nanosecond.The timestamp of unmanned vehicle and/or logger can be with
With pinpoint accuracy (for example, second, millisecond, microsecond and/or magnitude of nanosecond).Clock on unmanned vehicle and/or logger
Can be synchronous.The clock may be used to provide timestamp.In some cases, in unmanned vehicle and/or logger
One or more clocks between there may be some biasings, but the biasing can be known and can compensate.Triangle
E measurement technology or other similar technologies can be used for based on from unmanned vehicle to the distance of one or more loggers come really
Determine the rough position of unmanned vehicle.
In the additional example of analysis unmanned vehicle position, one or more loggers can also be strong by reception signal
Degree instruction (RSSI) substantially determines the distance between unmanned vehicle and logger.RSSI can be to receiving at logger
The measurement of power present in signal (for example, radio signal).Higher rssi measurement value can indicate that stronger signal.
In some embodiments, wireless signal can be with range attenuation.Therefore, stronger signal can be with nearer distance phase
Close, and weaker signal can be related to farther distance.Based on RSSI unmanned vehicle can be determined to the big of logger
Cause distance.In some cases, can more multiple loggers RSSI to determine the rough position of unmanned vehicle.For example,
Provided that two loggers, then the potential site of unmanned vehicle may be provided as hyperbola.Provided that three or more
Individual logger, then rough unmanned vehicle position can be determined using triangulation technique.If multiple loggers are shown
Different RSSI values, then compared to the logger for showing weaker RSSI value, unmanned vehicle can be away from showing stronger RSSI
The logger of value closer to.
Further example can provide one or more loggers with multiple receiving channels.The logger can have
There are one or more antennas, the antenna can receive multiple signals.For example, reception antenna can have multiple receiving channels.
It can handle by the multiple receiving channel and the multiple signals received to obtain the relative direction of unmanned vehicle.Blank pipe system
The other parts of system, Verification System or Verification System can be handled from reception antenna by way of receiving beam forming
Multiple signals.This can allow air traffic control system or other entities substantially to obtain direction and position of the unmanned vehicle relative to logger
Put.The direction that beam forming can be arrived with detection signal, and can be used for detecting side of the unmanned vehicle relative to logger
To.Multiple loggers can be used for wherein intersecting to reduce unmanned vehicle by the desired orientation for watching unmanned vehicle
Position range.
In another example, logger can include sensor, such as vision sensor, sonac or other types
Sensor.Logger can be able to record the environment around the logger.Logger can record unmanned flight in environment
The presence or movement of device.For example, logger can use the unmanned vehicle of flight in video tape recording environment.Carry out self-recorder
Data can be used for detecting unmanned vehicle and analyze position of the unmanned vehicle relative to logger.For example, can be with base
The size of unmanned vehicle determines distance of the unmanned vehicle relative to logger in image, and/or works as sensor
Direction known to when, it may be determined that direction.
The position of logger can be known.The world coordinates of logger can be known.Or logger can be with
With local coordinate, and the local coordinate of logger can be changed to common coordinate system.In some embodiments, remember
Record device can have precalculated position.In other cases, logger can be moved around or placed by ad hoc fashion.Logger can
The signal of the logger position is indicated with transmission.For example, each logger can have GPS unit, the GPS unit can
To provide the world coordinates for logger.The coordinate for logger can be transmitted.Air traffic control system or Verification System it is any
Other parts could be aware that the position of logger.Any other part of air traffic control system or Verification System can receive from logger
Indicate the signal of the logger position.Therefore, even if logger moves around, air traffic control system can also have on record
Device position updates the data.In some cases, logger can be the midget plant that can be picked and move around.Logger
Can be with self-propelled or can not self-propelled.Logger can hold or can be carried by the mankind.Or logger can be
Sizable device in an opening position can be permanently or semi-permanently provided.
Any number of logger can be provided in region.Can provide one, two, three, four, five, six
Individual, seven, eight, nine, ten or more loggers.In some cases, the signal from unmanned vehicle can have
There is limited range.In some cases, the logger only in the certain distance of unmanned vehicle can be with reception signal.Connect
Collect mail number logger can record on received signal information and can be to Verification System (for example, certification system
The air traffic control system of system) information is provided.Logger from the greater number of unmanned vehicle reception signal can be unmanned vehicle
Rough position higher degree of certainty or accuracy are provided.In some embodiments, greater density is provided in specific region
Or more the logger of number can increase the logger of a great deal of the possibility of signal will be received from unmanned vehicle.
Under certain situation, logger can be distributed in density be at least per sq. mi 1 logger, per 3 loggers of sq. mi,
5 loggers of every sq. mi, 10 loggers of every sq. mi, 15 loggers of every sq. mi, every sq. mi 20
Logger, per sq. mi 30 loggers, per 40 loggers of sq. mi, per 50 loggers of sq. mi, every square
200 70 loggers of mile, 100 loggers of every sq. mi, 150 loggers of every sq. mi, every sq. mi notes
Record device, 300 loggers of every sq. mi, 500 loggers of every sq. mi, the region per 1000 loggers of sq. mi
In.
Logger can be distributed on large regions.For example, multiple loggers can be distributed in greater than about 50 square metres, 100
Square metre, 300 square metres, 500 square metres, 750 square metres, 1000 square metres, 1500 square metres, 2000 square metres, it is 3000 flat
Square rice, 5000 square metres, 7000 square metres, 10000 square metres, 15000 square metres, 20000 square metres or 50000 square metres
On region.With big region can aid in detection traveling time, signal intensity or by logger collect other data in
Difference.If logger is only located in zonule, the traveling time of signal will very little, or be likely difficult to logger with
Distinguished or distinguished between logger.Logger can be spread apart from each other.For example, at least two in multiple loggers
Positioned at least apart 1 meter, apart 5 meters, apart 10 meters, apart 20 meters, apart 30 meters, phase each other
Away from 50 meters, it is apart 75 meters, apart 100 meters, apart 150 meters, apart 200 meters, apart 300 meters,
It is apart 500 meters, apart 750 meters, apart 1000 meters, apart 1250 meters, apart 1500 meters, each other
At a distance of 1750 meters, apart 2000 meters, apart 2500 meters, apart 3000 meters, 5000m apart or that
This is at ten thousand metres.Detection traveling time, signal intensity is can aid in the logger that can separate distribution or by recording
Difference in other data that device is collected.If logger be close together it is too near, the traveling time of signal will very little, and can
It can be difficult to be distinguished or distinguished between logger and logger.
Any other part of authentication center, air traffic control system or Verification System can based on receive self-recorder data come
Calculate the rough position of unmanned vehicle.One or more processors can be used for calculating nothing based on the data for carrying out self-recorder
The rough position of people's aircraft.Come self-recorder data can include time stamp data, signal strength data or herein other
The data of any other described type everywhere.
Any other part of Verification System, air traffic control system or Verification System can compare rough position based on timing information
Confidence breath inspection unmanned vehicle claims position, whether there is relatively large difference between position and rough position to determine to claim
It is different.Larger deviation can indicate that the high risk that some form of harm is caused to unmanned vehicle.For example, larger is inclined
Difference can indicate that the high risk of the position of false unmanned vehicle.False position from unmanned vehicle can indicate that
The behavior (for example, the position data forged is distorted or reported to sensor) of malicious act or fraud correlation.False position can refer to
Show the navigation system of unmanned vehicle mistake or failure (for example, infringement GPS sensor, for determining unmanned vehicle
One or more sensor errors of position).The mistake or failure of the navigation system of unmanned vehicle are not necessarily malice, but
If without the position for accurately tracking unmanned vehicle, may also throw into question.In some cases, the sound of unmanned vehicle
Title/reported position can be compared with the calculation position of unmanned vehicle, and works as calculation position and claim the difference between position
It is different when exceeding threshold value, warning can be provided.In some cases, it is determined that only considering the difference between position in terms of the risk of fraud
It is different.Or, it may be considered that such as other described other factors everywhere herein, such as environmental condition, radio communication conditions, nobody flies
Row type parameter or any other factor.
Logger can exist as air situation monitoring system, and can record going through for the aerial mission monitored
History.Air traffic control system can be by the same nothing acquired in the flight information of unmanned vehicle Active report and one or more loggers
The flight information of people's aircraft compares, and quickly judges the data true and false of unmanned vehicle report.Nobody is flown when existing
When row device causes the risk of some form of harm, warning can be provided.Manipulator that can be to unmanned vehicle, air traffic control system
Or any other entity provides warning.Warning can indicate that or can not indicate that the estimation of risk is horizontal.Warning can be with
Indicate or can not indicate harm type (for example, it may be possible to malice distort or forge, possible sensor fault).
The verification process of user
Authentication center can be authenticated using any number of process come the identity of the user to manipulating unmanned vehicle.
For example, authentication center can use simple verification process, such as by by the identification information of user and password and being associated with institute
The authentication information stated user and stored is compared.During other, can by obtain the vocal print of user, fingerprint and/or
Iris information and acquired information is compared to be authenticated the identity of user with stored user profile.Or
Person, it can be verified using the short message signal (SMS) sent to the mobile device associated with user to verify user identity.System
System can also be authenticated using the built-in identity module in token and/or remote control to the user for being associated with remote control.
In further example, the process being authenticated to user can include the certification of diversified forms listed above.
It is, for example, possible to use two step process is authenticated to user, the two step process need user input identification information (such as with
Name in an account book) together with password, and then by verifying that the text received at the mobile device of user provides certification come requirement user
Second step.
After successful execution certification, authentication center can retrieve the information on user from database.Retrieve
Information can be sent to air traffic control system, and the air traffic control system can then determine whether user has the authority of flight.
The verification process of unmanned vehicle
When the intrinsic personal information of user (for example, vocal print, fingerprint) can be used to perform the certification to user, to nothing
The certification of people's aircraft can utilize the device information being stored in unmanned vehicle, such as encode the key into device.Cause
This, the group that the certification to unmanned vehicle can be based on unmanned vehicle identifier He the key being stored in unmanned vehicle
Close.Further, it is possible to use certifiede-mail protocol (AKA) realizes the certification to unmanned vehicle.AKA is two-way authentication association
View.In this example, when using AKA, authentication center can be authenticated to the legitimacy of unmanned vehicle, and unmanned vehicle
The legitimacy of authentication center can be authenticated.The example of the certification based on AKA is discussed in Figure 15.
Figure 15 shows the diagram according to the two-way authentication between the unmanned vehicle of embodiment of the present invention and authentication center
1500.Specifically, Figure 15 shows the mode that unmanned vehicle interacts with air traffic control system, and the air traffic control system is transferred and recognized
Card center interacts.
Universal subscriber identity module (USIM) can be based on and perform the AKA between unmanned vehicle and authentication center and recognize
Card.Specifically, unmanned vehicle can have the airborne USIM modules comprising international mobile subscriber identity (IMSI) and key.
In some instances, when manufacturing unmanned vehicle, key is burned onto in the unmanned vehicle.When manufacture unmanned vehicle
When, key can be permanently written or be integrally formed into the unmanned vehicle.Therefore, key is protected and can not be by
Read.In addition, key is (for example, certification as illustrated in Figure 2 with any other of authentication center or Verification System part
Center 220) it is shared.To USIM to crack difficulty very big.In the field, AKA is recognized with high safety degree
Verification System.Therefore, authentication center can have high safety degree and public credibility, its expand to the IMSI to user, key and
Counter SQN protection.
As seen in step 1505, unmanned vehicle can provide certification request and IMSI to air traffic control system.Unmanned flight
Device actively (broadcast) or passive (response) can transmit its IMSI.
Once receiving certification request and IMSI at air traffic control system, then in step 1510, air traffic control system can be to
Authentication center's certified transmission request of data.Authentication data request can include the information on unmanned vehicle, and such as nobody flies
The IMSI of row device.
In step 1515, authentication center can receive IMSI, key, generation random number and according to pre- corresponding to inquiry
Algorithm is determined to calculate authentication vector (AV).Algorithm f1, f2, f3, f4 and f5 pacify in typical Universal Mobile Telecommunications System (UMTS)
It is described in full agreement.AV can include 5 elements, and such as, (encryption is close by RAND (random number), XRES (expected response), CK
Key), IK (integrity check key) and AUNT (authentication token).Or authentication vector can include one or more elements, institute
Element is stated including at least one in the element in this example (including different elements).In this example, AUTN is by being hidden
Counter SQN, AMF (authentication management of submission) and MAC (message authentication code) composition.
AUNT:=SQN (+) AK | | AMF | | MAC
In step 1520, authentication center can respond to air traffic control system certified transmission data, described in step 1525
Air traffic control system can then provide the authentication response for including AUNT and RAND to unmanned vehicle.Specifically, AUNT and RAND
The security module A of unmanned vehicle can be transferred to.In step 1530, security module A can verify AUNT.Security module A
AK can be calculated according to RAND and key.Once calculating AK, SQN can be calculated and recovered according to AUNT.Then can be with
Calculate XMAC (authentication code of expectation), RES (response to random number), CK (encryption key) and IK (integrity check key).
Security module A can compare MAC and XMAC.If MAC and XMAC are differed, unmanned vehicle can be to remote control and certification
Center sends certification refuse information, and certification is terminated as response.Or if MAC is identical with XMAC, security module A can
To verify whether the SQN received falls in the reasonable scope.Specifically, security module A can be recorded receives most so far
Big SQN, therefore SQN may only be incremented by.If SQN is abnormal, unmanned vehicle can send synchronization failure message, then can
Terminate certification.Or if SQN falls in the reasonable scope, security module A can verify AUNT authenticity and can be to
Authentication center provides computer RES.
As seen in Figure 15, in step 1535, security module A can transmit RES to air traffic control system, in step 1540
In, the air traffic control system then can provide RES to authentication center.Or unmanned vehicle can be carried directly to authentication center
For RES.
Once authentication center has been received by RES, then in step 1545, it is (right that the authentication center can compare XRES
The expected response of random number) and RES.If it find that XRES and RES are inconsistent, then authentification failure.Or if it find that XRES and
RES is identical, then mutual authentication success.
After mutual authentication, unmanned vehicle and air traffic control system can perform peace by using the CK and IK that consult
Full communication.Specifically, after mutual authentication, in step 1550, authentication center can transmit to air traffic control system and consult
CK and IK.In addition, in step 1555, unmanned vehicle can calculate the CK and IK consulted.Once air traffic control system is from recognizing
Card center has been received by the CK and IK consulted, then can be built in step 1560 between unmanned vehicle and air traffic control system
Vertical secure communication.
Air traffic control system
Air traffic control system can include user and unmanned vehicle access subsystem, air situation monitoring subsystem, traffic administration
System and geography fence subsystem.Air traffic control system can perform many functions, including the monitoring of real-time air situation and record unmanned flight
Device activity.Air traffic control system can also assign traffic power in limited spatial domain.In addition, air traffic control system can accept geography fence device
Application, and can also authorize and determine the attribute of the geography fence device.
Air traffic control system can also carry out necessary user and aircraft certification examination & verification.Further, air traffic control system can supervise
Control violation aircraft.Air traffic control system can identify unlawful practice or the behavior close to violation, and such behavior can be given
With warning.In addition, air traffic control system can provide counterattacking measure, such as air situation monitoring, traffic power for continuing the aircraft of violation
Management, the violation counter with the safe interface of authentication center, geography fence and other forms.Air traffic control system can also possess each
Event recording function.Air traffic control system can also provide the access classes to air situation information.
Air traffic control system can include air situation monitoring subsystem.Air situation monitoring subsystem can be responsible for monitoring in real time and assign sky
The flight of flight progress in domain, such as unmanned vehicle.Specifically, air situation monitoring subsystem can monitor authorized flight
Whether device is flown along predetermined navigation channel.Air situation monitoring subsystem can also be responsible for finding the abnormal row of authorized aircraft
For.Abnormal behaviour based on discovery, air situation monitoring subsystem can send alarm to violation counter system.In addition, air situation monitors
Subsystem can monitor the presence of aircraft without permission and can be based on the detection to aircraft without permission and in violation of rules and regulations
Counter system sends alarm.The example of spatial domain monitoring can include radar, photoelectricity harmony sensing and other examples.
Air situation monitoring subsystem can also actively perform the checking to aircraft identity, and can also be to received from flight
The certification request of device is responded.In addition, air situation monitoring system can be with active obtaining on the state of flight of given aircraft
Information.When monitoring aircraft, monitored aircraft can be positioned in three dimensions.For example, air situation monitors
System can track the flight path of aircraft and by it compared with planning navigation channel, to identify abnormal behaviour.Abnormal behaviour can quilt
The behavior more than predetermined tolerance limit threshold value is identified as (for example, in flight for deviateing predetermined flight plan or being down to threshold level
Following threshold value).In addition, control point can be distributed or centralized.
Air situation monitoring subsystem can have the Main Means for being used for spatial domain monitoring, i.e. real-time reception and parsing (directly connects
Receive or receive forwarding) it is monitored the flight on aircraft of (or cooperation) aircraft real-time broadcast authorized in spatial domain in itself
Information.Real-time flight information can be obtained by the active inquiry of blank pipe and the response of aircraft.In addition, air situation monitoring
System can have the supplementary means for spatial domain monitoring, such as acoustic radar and electro-optic radar.In this example, can allow through recognizing
The user of card inquires about current air situation state to spatial domain monitoring subsystem.
Air traffic control system can also include traffic power management subsystem.Traffic right management system can be responsible for accepting to be provided to navigation channel
The initial application in source and the application to changing navigation channel, this can plan Flight Path and be sent to applicant on to application
Really the feedback of provisioning response.It is determined that in response the Examples of information that provides include in the Flight Path of planning, way control point and
Corresponding time window.In addition, when the condition in this spatial domain and/or other spatial domains changes, traffic right management system can be born
Duty adjusts predetermined Flight Path.The reason for predetermined Flight Path can be adjusted, includes but is not limited to weather, can use spatial domain resource
Change, accident, geography fence device are set up and to geography fences such as spatial dimension, duration and restricted ranks
The adjustment of the attribute of device.Traffic right management system can also inform applicant or user on the original flight to be adjusted boat
Road.The distribution in the authorized aerial navigation channel of subsystem inquiry is managed it is possible to further allow certified user to be weighed to traffic.
Air traffic control system can also include the safe interface with authentication center subsystem.Connect with the safety of authentication center subsystem
Mouth can be responsible for the secure communication with authentication center.Specifically, for authentication purposes or for aircraft and user
The purpose of attribute query is carried out, air traffic control system can communicate with authentication center.
In this example, user can know the other users in areal by air traffic control system.User can select
Information, such as their flight path are shared with other users.User can also share the content captured by its device.Example
Such as, user can share the content captured from the camera on or within its unmanned vehicle.In addition, user can be each other
Send instant message.
Unmanned vehicle flight system can also include geography fence subsystem, and the geography fence subsystem includes one
Or multiple geography fence devices.Unmanned vehicle can detect geography fence device, and or vice versa.Geography fence fills
Putting can be such that unmanned vehicle is acted according to one group of air traffic control.The example of geography fence subsystem will be in the application hereinafter
In discuss in more detail.
Only rely upon the flight course of unmanned vehicle certification
In some applications, before unmanned vehicle can take off, air traffic control system, which only can need to perform, is directed to nobody
The certification of aircraft.In such applications, it is not necessary to perform the certification for user.Air traffic control system is performed for unmanned vehicle
The process of certification can be demonstrated by the AKA provided in such as figure 15 above.After certification, unmanned vehicle and air traffic control system can
To obtain CK and IK to communicate with one another, as described in Figure 15 step 1550 and step 1555.CK can be used for data encryption,
And IK can be used for data integrity protection.
After certification, user can be obtained via the channel of safety it is final during verification process caused by key (CK,
IK), and the communication data between user and unmanned vehicle can be encrypted by using key and protected, to keep away
Exempt to be held as a hostage or controlled by mistake.Therefore, follow-up data-message (MSG) can include the information relevant with unmanned vehicle,
The position of unmanned vehicle, speed of unmanned vehicle etc..By this way, unmanned vehicle can be protected by inclusive
And tested by IK.The information of transmission is as follows:
Equation 1:MSG1||((HASH(MSG1)||CRC()+SCR(IK))||IMSI
Wherein MSG1=MSG | | RAND | | TIMESTAMP | | GPS
In above equation 1, CRC () can be message loop verification and, and SCR (IK) can be that data are covered derived from IK
Code.In addition, in this manual, MSG is origination message, HASH () is hash function, and RAND is random number, and TIMESTAMP is
Current time stamp, and GPS are current locations, to avoid playback formula from attacking.
Figure 16 shows the process 1600 for being used to send the message with ciphering signature according to embodiment of the present invention.
In one step 1610, message has been write.Provided in as discussed above, message can be expressed as " MSG ".Message is write
Afterwards, in step 1620, the sender of message can generate the message using hash function from the text of the message
Summary.Summary can be the Hash of only message --- MSG --- in itself, or it can be modified message --- such as
Such as seen MSG1 above --- Hash.Specifically, MSG1 can include such as origination message MSG, random parameter RAND, when
The compilation of the information such as preceding time stamp T IMESTAMP and current location GPS.In other examples, modified message can include
Alternative information.
Once generating message MSG or modified message MSG1 summary, in step 1630, sender can use individual
The summary is encrypted people's key.Specifically, it can use sender public-key cryptography that summary is encrypted, so that
The summary that must be encrypted can serve as the idiograph of transmitted message.Therefore, in step 1630, the cryptographic digest can be with
Then recipient is sent jointly to using as the digital signature of message and message.
Figure 17 shows to be used for by the way that signature is decrypted to verify the process of message according to embodiment of the present invention
1700.As seen in step 1710, recipient receives message and cryptographic digest, and the message and encryption discussed in such as Figure 16 are plucked
Will.In step 1720, recipient can use to be calculated with sender's identical hash function from the origination message received
The summary of outbound message.In addition, in step 1730, recipient can be using the public-key cryptography of sender come come to message attachment
Digital signature is decrypted.Once the digital signature of message attachment is decrypted, in step 1740, recipient can compare
Summary.If the two summaries are identical, recipient can confirm that the digital signature is from sender.
Therefore, when other fellows receive such information and are uploaded to authentication center, it can be used as numeral label
Name is treated.That is, the presence of such wireless messages is equal with the presence of the unmanned vehicle.This process can simplify nobody
The verification process of aircraft.I.e. after the completion of initial authentication, unmanned vehicle can correctly be announced by performing said process
The determination of oneself is present, and without necessarily initiating the initial authentication process of complexity every time.
Dependent on unmanned vehicle and the flight course of user authentication
In some applications, only after the double authentication of unmanned vehicle and user is carried out, unmanned vehicle just may be used
To take off.
Certification for user can be based on electron key.When manufacturing unmanned vehicle, manufacturer can be with built-in electronic
Key.Electron key can have built-in usim card, and the card includes (related with user to the authentication center IMSI-U shared
The IMSI of connection) and K-U (key associated with user).This is also the unique person identifier of user and is only manufacturing USIM
When write-once.Therefore, usim card can not be replicated or forge.Moreover, its by USIM security mechanism protection and can not
Read.Therefore, difficulty USIM being decrypted is very big.Electron key, remote control can be inserted in as an electronic installation
In device, it is integrated in remote control or via the conventional meanses such as bluetooth (TM), WIFI, USB, audio, optic communication and remote control
Device communicates.Remote control can obtain the essential information of electron key and can be communicated with authentication center and corresponding recognize
Card.
Certification for user can also be realized by various other means, the inherent feature of such as user.It is specific and
Speech, the certification to user can be realized by vocal print, fingerprint, iris information etc..
Certification for unmanned vehicle is that the security module is via CH (channel) with recognizing based on airborne security module
Card center is authenticated.In this example, the airborne security module of unmanned vehicle includes USIM, and the USIM includes IMSI-M
(IMSI associated with unmanned vehicle, for example, the IMSI such as provided by manufacturer) and K-M are (associated with unmanned vehicle
Key, for example, such as by manufacturer provide key).The K-M shared between unmanned vehicle and authentication center is being manufactured
Write-once during USIM.Moreover, it is protected by USIM security mechanism and can not read.Therefore, USIM is decrypted
Difficulty it is very big.
The airborne security module of unmanned vehicle and authentication center can carry out two-way authentication, and process and the two-way of UMTS are recognized
Demonstrate,prove it is similar, using certifiede-mail protocol mechanism, i.e. AKA.AKA is bidirectional identification protocol.That is, not only authentication center is required to nothing
The legitimacy of people's aircraft or electron key is verified, and unmanned vehicle or electron key are also required to providing service
The legitimacy of authentication center is verified.Between the unmanned vehicle provided in Figure 15 as discussed above and authentication center
AKA verification process illustrates this process.
Before aerial mission is performed, unmanned vehicle and electron key may need to perform verification process.In this example,
Both are serially or parallelly authenticated with authentication center, wherein being carried out Basic Authentication process.Specifically, fly to nobody
(IMSI-M, K-M) can be used in the certification of row device, and (IMSI-U, K-U) can be used in the certification to electron key.
It is described below general description.The security module refers to unmanned vehicle or electron key.
After the certification of unmanned vehicle and authentication center is completed, authentication center can determine nobody by database
Some characteristics of aircraft.For example, authentication center can determine the type of unmanned vehicle, the ability of unmanned vehicle, nobody
The maintenance of the ownership of aircraft, health/operational situation of unmanned vehicle, unmanned vehicle needs, the history of unmanned vehicle
Log etc..In addition, after the certification of electron key and authentication center is completed, authentication center can determine the electronics key
The personal information of user, operating right, flying history etc. corresponding to spoon.
After above-mentioned certification is completed, controller obtains the several important passwords consulted:CK-U is (associated with user
CK), IK-U (the associated IK with user's), CK-M (CK associated with unmanned vehicle) and IK-M are (with unmanned vehicle phase
The IK of association).Above-mentioned basic verification process and result can flexibly use in the scene of unmanned vehicle.
Electron key can consult aerial mission via encryption channel and authentication center.Authentication center can be based on user and
The attribute of unmanned vehicle and ratified, refused or provided related amendments suggestion or prompting to aerial mission.Flying
Cheng Zhong, certification can also use each password and keep communicating with unmanned vehicle and remote control, (all to obtain flight parameter
Such as position, speed) and management awing and the authority of control unmanned vehicle or user.
In wireless communication link between unmanned vehicle and remote control, using pair of unmanned vehicle and electron key
Sign again.When sending the message, sender generates eap-message digest using hash function from Message-text, and then using individual
The summary is encrypted key.Summary after this encryption is sent jointly to as the digital signature of message and the message
Recipient.Recipient is plucked first by calculating message from the origination message received with sender's identical hash function
Will, and then the digital signature of message attachment is decrypted using the public-key cryptography of sender.If the two summaries are identical,
Then recipient can confirm that the digital signature is from sender.
Specifically, follow-up data-message (MSG) can be guidance command, position report, speed report etc., and can
With integrity protected and tested by K-U and IK-M.The information transmitted is as follows:
MSG1||(HASH(MSG||RAND)||CRC)(+)SCR1(IK-M)(+)SCR2(IK-U))||IMSI-U||
IMSI-M
Wherein MSG1=MSG | | RAND | | TIMESTAMP | | GPS
In above equation, CRC (+) be message loop verification and, and SCR1 (IK) and SCR2 (IK) are several derived from IK
According to mask.SCR1 () and SCR2 () can be common cipher code generator.In addition, HASH () is hash function, and RAND is
Random number, TIMESTAMP is current time stamp, and GPS is current location, to avoid playback formula from attacking.
When being uploaded to authentication center, such information can be treated as digital signature.That is, such wireless messages
It is equal in the presence of the presence with the unmanned vehicle and the presence of user.This process can simplify the certification of unmanned vehicle
Process.I.e. after the completion of initial authentication, unmanned vehicle can correctly announce that the determination of oneself is deposited by performing said process
, and without necessarily initiating the initial authentication process of complexity every time.
Can be that above-mentioned IK distributes the legal period to strengthen security.Authentication center and unmanned vehicle and electronics key
Spoon can continuously carry out AKA processes.In flight course, unmanned vehicle can receive the program of user's switching.
Authentication center can possess the identity of unmanned vehicle, the registration aerial mission of unmanned vehicle and its practical flight
History.It can also possess the information of corresponding user.Moreover, the result based on bi-directional verification, authentication center can also be to user
Various services on safety and information are provided.Authentication center can also carry out a certain degree of adapter to unmanned vehicle.Example
Such as, authentication center can adapter unmanned vehicle some functions.By this way, supervision of the regulator to unmanned vehicle
Strengthened with control.
Process of supervision
Air traffic control system can send IMSI querying commands via pccr-to-pccr communicator B to unmanned vehicle.In unmanned vehicle
After being responded using its IMSI to IMSI inquiries, the manager at air traffic control system can initiate mentioned order certification to identify
The unmanned vehicle is the legal unmanned vehicle for possessing IMSI.Once having determined that unmanned vehicle is legal possesses IMSI, just
The CK consulted and IK can be used further to perform the Signalling exchange of both sides between unmanned vehicle and air traffic control system.Example
Such as, unmanned vehicle can be with report history information or task scheduling.In addition, air traffic control system can require that unmanned vehicle performs certain
A little actions.Therefore, air traffic control system can take over some actions of control unmanned vehicle.It is empty by using the verification process
Guard system may insure the correct mark to unmanned vehicle, without risk of assuming another's name.
In another example, if air traffic control system sends IMSI querying commands to unmanned vehicle and receives no sound
Should, errored response or erroneous authentication, then air traffic control system can consider that unmanned vehicle is non-to close rule.In other examples, nothing
People's aerocraft system can ask unmanned vehicle without periodic broadcasting in the case of the prompting from air traffic control its
IMSI.Air traffic control system can select to initiate the above-mentioned verification process with unmanned vehicle when receiving broadcasted IMSI.
Geography fence is summarized
Unmanned vehicle flight system can include one or more geography fence devices.Unmanned vehicle be able to can be examined
Geodetic manages fence apparatus, and or vice versa.Geography fence device can be such that unmanned vehicle is moved according to one group of air traffic control
Make.One group of air traffic control can include geographical part that can be related to the position of geography fence device.For example, geography fence
Device can be provided in a certain opening position and can claim one or more geography fence borders.Can be in geography fence border
Within control unmanned vehicle activity.Alternatively or additionally, can outside geography fence border control unmanned vehicle
Activity.In some cases, put on unmanned vehicle rule within geography fence border with geography fence border
Outside may be different.
Figure 18 shows the example of the unmanned vehicle and geography fence device according to embodiment of the present invention.Geography fence fills
Geography fence border 1820 can be claimed by putting 1810.Unmanned vehicle 1830 can run into geography fence device.
Unmanned vehicle 1830 can operate according to one group of air traffic control.One group of air traffic control can be based on ground
Manage fence apparatus and generate.One group of air traffic control is considered that the border of geography fence device.One group of air traffic control
Can be associated with the geography fence border in the certain distance of geography fence device.
Geography fence device 1810 can be provided in a certain opening position.Geography fence device can be used for assisting in
Any device of one or more geography fence borders, the geography fence border can be used for one or more groups of air traffic control
In.Geography fence device can transmit or can not transmission signal.Signal may or may not be can be by unmanned flight
What device detected.Unmanned vehicle can detect geography fence device with or without signal.Geography fence device
It or can can not detect unmanned vehicle.Unmanned vehicle can transmit or can not transmission signal.Letter
Number may or may not be that can be detected by geography fence device.One or more middle devices, which be able to can detect, to be come
From unmanned vehicle and/or the signal of geography fence device.For example, middle device can receive the letter from unmanned vehicle
Number, and the data on the unmanned vehicle can be transmitted to geography fence device.Middle device can be received from ground
The signal of fence apparatus is managed, and the data on the geography fence device can be transmitted to unmanned vehicle.As herein its
He is more fully described everywhere, the various combinations that can be detected and communicate.
Geography fence device may be used as the reference to one or more geography fence borders 1820.Geography fence border can
To indicate two-dimentional area.It is described two dimension area on or below anything can be located at the geography fence border it
It is interior.The anything on or below area outside the two dimension area can be located at outside the geography fence border.
In another example, geography fence border can indicate that three-D volumes.Space within the three-D volumes can described
Manage within fence boundary.Space outside the three-D volumes can be outside the geography fence border.
Geography fence device border can be open or closure.The geography fence device border of closure can be sealed completely
The area closed in the geography fence device border.The geography fence device border of closure can begin and end with same point.
In some embodiments, the geography fence border of closure can not have beginning or end.The geography fence border of closure
Example can be circular, square or any other polygon.Open geography fence border can have different starting points and
Terminal.Geography fence wall can have linear or curve border.The geography fence border of closure can close an area.
For example, the border of closure, which can aid in, limits flight restricted area.Open geography fence border can form barrier.Barrier can
To help to form geography fence border at natural physical boundary.The example of physical boundary can include administrative area border
(for example, border between country, area, state, province, town, city or boundary location line), naturally occurring border (for example, river, small stream, river,
Steep cliff, gully, valley), artificialboundary's (for example, wall, street, bridge, dam, door, access road) or any other type
Border.
Geography fence device can have the position relative to geography fence border.The position of geography fence device can be used
In it is determined that the position of geography fence border.The position of geography fence device can serve as the reference to geography fence border.For example,
If geography fence border is the circle around geography fence device, geography fence device may be at the center of circle.Therefore, base area
The position of fence apparatus is managed, geography fence border can be confirmed as the circle around the geography fence device, and the circle is with geography
Fence apparatus is its center of circle and has predetermined radii.Geography fence device needs not to be the center of circle.For example, geography fence can be provided
The border of device with cause the border be relative to geography fence device bias circle.Geography fence device can be located in itself
In the border of geography fence device.In the alternative, the border of geography fence device can cause the geography fence
Device is located at outside the border of the geography fence device.However, the border of geography fence device can be based on geography fence
The position of device and determine.The position on the border of geography fence device can also be based on geography fence border type (for example,
Shape, the size of geography fence border) and determine.For example, if it is known that geography fence border type is filled with geography fence
The hemispherical border that the position put is the center of circle and radius is 30 meters, and it is X that known geographic fence apparatus, which has world coordinates,
Y, Z, then the position of geography fence border can be calculated according to world coordinates.
Unmanned vehicle can be close to geographical fence apparatus.Identification to geographical fence apparatus border can be by unmanned flight
Device provides.Unmanned vehicle can fly according to air traffic control, and it is to be located at that the air traffic control, which is based on the unmanned vehicle,
There is different rules on first side on geography fence device border or on second side on geography fence device border.
In one example, unmanned vehicle may not be allowed to be flown in the border of geography fence device.Therefore, nothing is worked as
, can be to having passed over geography fence close to geography fence border or unmanned vehicle when people's aircraft is close to geographical fence apparatus
Detected on border.It can be detected by unmanned vehicle.For example, unmanned vehicle be known that unmanned vehicle position and
Geography fence border.In another example, can be detected by air traffic control system.Air traffic control system can be received on unmanned flight
Device position and/or the data of geography fence setting position.Unmanned vehicle is known that or can not known that geography fence fills
Seated position.Air traffic control can cause unmanned vehicle to be not allowed to fly in the border.It can be adopted by unmanned vehicle
Take flight responsive measures.For example, the navigation channel of unmanned vehicle can be changed so that the unmanned vehicle does not enter geography fence
Area in border, or if the unmanned vehicle comes into, then the unmanned vehicle can be made to leave geography and enclosed
Area in column border.The flight responsive measures of any other type can be taken, it can include the use to unmanned vehicle
Family or air traffic control system provide warning.Flight responsive measures can be initiated on unmanned vehicle machine, or can be from air traffic control system
Initiate flight responsive measures.
In some cases, unmanned vehicle can be close to geographical fence apparatus.Unmanned vehicle is known that nobody flies
The position of row device itself is (for example, use GPS unit, any other sensor or other described any other everywhere herein
Technology is known).Unmanned vehicle is known that the position of geography fence device.Unmanned vehicle can directly sense geography and enclose
Column device.Geography fence device, which can sense unmanned vehicle and can be transmitted to unmanned vehicle, indicates that geography fence fills
The signal of seated position.Unmanned vehicle can receive the instruction to geographical fence apparatus from air traffic control system.Filled based on geography fence
Seated position, unmanned vehicle are known that the position of geography fence border.Based on the known location of geography fence device, nobody flies
Row device can calculate the position of geography fence border.In other cases, can be performed over the ground outside unmanned vehicle machine
The calculating of fence boundary position is managed, and the position of geography fence border can be transmitted to unmanned vehicle.For example, geography fence
Device could be aware that its own position and border type (for example, the space layout of border relative to setting position).It is geographical
Fence apparatus can calculate the position of its geography fence border and transmit the boundary information to unmanned vehicle.Boundary information
It can be transmitted directly or via one or more intermediates (for example, air traffic control system) from geography fence device to unmanned vehicle.
In another example, air traffic control system could be aware that geography fence setting position.Air traffic control system can from geography fence device or from
Unmanned vehicle receives geography fence setting position.Air traffic control system could be aware that the type on border.Air traffic control system can calculate
The position of geography fence border and can to unmanned vehicle transmit boundary information.Boundary information can be directly from air traffic control system
Transmit to unmanned vehicle.Boundary information can transmit winged to nobody directly or via one or more intermediates from air traffic control system
Row device.When unmanned vehicle knows the position of geography fence border position, the unmanned vehicle can compare its own phase
For the position of geography fence border position.
Based on the comparison, one or more flight responsive measures can be taken.Unmanned vehicle be able to can voluntarily be sent out
Act the flight responsive measures to be taken.Unmanned vehicle can have one group of air traffic control being stored on unmanned vehicle machine simultaneously
And it can observe the air traffic control and initiate flight responsive measures.Or air traffic control can be stored in unmanned flight
Device machine is outer but be able to can be accessed by unmanned vehicle, so that unmanned vehicle determines what is taken by the unmanned vehicle
Flight responsive measures.In another example, unmanned vehicle does not initiate flight response voluntarily, but can receive and fly from external source
Response instruction.Compared based on the position, unmanned vehicle can inquire whether external source needs flight responsive measures, if needed
Will, then external source can provide the instruction for flight responsive measures.For example, air traffic control system can watch position relatively and determine
Whether flight responsive measures are needed.If it is required, then air traffic control system can provide direction for unmanned vehicle.If for example, nothing
People's aircraft flight path needs to deviate to avoid enter into geography fence border, then can provide the life of change flight path
Order.
In another case, unmanned vehicle can be close to geographical fence apparatus.Unmanned vehicle is known that the nothing
The position of people's aircraft itself is (for example, using GPS unit, any other sensor or other are described any everywhere herein
Other technologies are known).Unmanned vehicle does not know the position of geographical fence apparatus alternatively.Unmanned vehicle can be to outside
Device provides the information on unmanned vehicle position.In one example, external device (ED) is geography fence device.Geography fence
Device is known that the position of its own.Geography fence device can know that nobody flies from the information of unmanned vehicle from providing
Row device position.In the alternative, geography fence device can sense unmanned vehicle and based on the data sensed
To determine unmanned vehicle position.Geography fence device be able to can receive from additional sources such as air traffic control systems to fly on nobody
The information of row device position.Geography fence device is known that the position of geography fence border.Geography fence device being capable of base
The position of geography fence border is calculated in the known location of geography fence device.The calculating of boundary position is also based on side
Boundary's type (for example, the space layout of border relative to setting position).It is geographical when known to the position of geography fence border position
Fence apparatus can compare position of the unmanned vehicle relative to geography fence border position.
In another example, external device (ED) is air traffic control system.Air traffic control system is known that geography fence setting position.Blank pipe
System can receive geography fence setting position directly or via one or more middle devices from geography fence device.Blank pipe system
System can sense geography fence device and determine geographical fence apparatus position based on the data sensed.In certain situation
Under, the information from one or more loggers is determined for the position of geography fence device.Air traffic control system can
The position of geography fence device is received from additional sources such as unmanned vehicles.Air traffic control system can be from providing from unmanned vehicle
Information in know unmanned vehicle position.In the alternative, air traffic control system device can sense unmanned vehicle simultaneously
And unmanned vehicle position is determined based on the data sensed.In some cases, the letter from one or more loggers
Breath is determined for the position of unmanned vehicle.Geography fence device can be from additional sources such as geography fence devices
Receive the information on unmanned vehicle position.Air traffic control system is known that the position of geography fence border.Air traffic control system can be with
The position on geography fence device border is received from geography fence device or another source.Air traffic control system can be based on geography fence
The known location of device and calculate the position of geography fence border.Calculating to boundary position is also based on boundary types
(for example, the space layout of border relative to setting position).When known to the position of geography fence border position, air traffic control system can
To compare position of the unmanned vehicle relative to geography fence border position.
Based on the comparison, one or more flight responsive measures can be taken.Geography fence device or air traffic control system can
So that the information on the comparison can be provided to unmanned vehicle.What unmanned vehicle be able to can voluntarily initiate to be taken flies
Row responsive measures.Unmanned vehicle can have one group of air traffic control being stored on unmanned vehicle machine and be able to can abide by
Keep the air traffic control and initiate flight responsive measures.Or can be stored in unmanned vehicle machine outer but can be with for air traffic control
It can be accessed by unmanned vehicle, so that the flight response that unmanned vehicle determines to be taken by the unmanned vehicle is arranged
Apply.
In another example, unmanned vehicle does not initiate flight response voluntarily, but flight response can be received from external source
Instruction.External source can be geography fence device or air traffic control system.Compared based on the position, if it is desired, then external source can
To provide the instruction for flight responsive measures.For example, air traffic control system can watch the position relatively and determine the need for
Flight responsive measures.If it is required, then air traffic control system can provide direction for unmanned vehicle.If for example, unmanned vehicle
Flight path needs to deviate to avoid enter into geography fence border, then can provide the order of change flight path.
Any description to air traffic control previously provided goes for herein.Geography fence device can set up position
The border put, it can work to air traffic control.As other each places provide herein, various types of tof tubes can be applied
System.Geography fence device can be used for setting up the border for different type air traffic control, and it can fly including that can influence nobody
The flight (for example, flight path, take off, land) of row device, the operation of the payload of unmanned vehicle, unmanned vehicle have
Imitate the positioning of load, the operation of carrier of unmanned vehicle, unmanned vehicle one or more sensors operation or layout,
The operation of one or more communication units of unmanned vehicle, the navigation operation of unmanned vehicle, the power cloth of unmanned vehicle
The control of any other of office and/or unmanned vehicle operation.
Figure 19 is shown according to the geography fence device of embodiment of the present invention, geography fence border and unmanned vehicle
Side view.Geography fence device 1910 can be provided in any opening position.For example, geography fence device can be provided in object
On on 1905 or surface 1925.Geography fence device may be used as the reference to one or more geography fence borders 1920.Nothing
People's aircraft 1930 can be close to geographical fence apparatus and/or geography fence border.
Geography fence device 1910 can be built up in a certain opening position.In some cases, can be with permanent or semipermanent
Mode geography fence device is provided.Geography fence device can be substantially immovable.Not by the situation of instrument
Under, geography fence device is not manually displaced.Geography fence device may remain in same position.In some cases, it is geographical
Object 1905 can be fixed or be attached to fence apparatus.Geography fence device can be built in the object.
Or geography fence device can be can be easy to it is mobile and/or portable.Geography fence device is without work
It can be moved manually in the case of tool.Geography fence device can move between position and position.Geography fence device energy
It is enough to be removably attached to object or by the object support.In some cases, geography fence device can be hand
Held device.Geography fence device can be picked up and carried by the mankind.Geography fence device can be picked up and taken by mankind's one hand
Band.Geography fence device can be easily transported.In some embodiments, geography fence device can weight to be less than or
Equal to about 500kg, 400kg, 300kg, 200kg, 150kg, 100kg, 75kg, 50kg, 40kg, 30kg, 25kg, 20kg, 15kg,
12kg、10kg、9kg、8kg、7kg、6kg、5kg、4kg、3kg、2kg、1.5kg、1kg、750g、500g、300g、200g、100g、
75g, 50g, 30g, 20g, 15g, 10g, 5g, 3g, 2g, 1g, 500mg, 100mg, 50mg, 10mg, 5mg or 1mg.Geography fence fills
Put can have less than or equal to about 5m3,3m3,2m3,1m3,0.5m3,0.1m3,0.05m3,0.01m3,0.005m3,
0.001m3、500cm3、300cm3、100cm3、75cm3、50cm3、30cm3、20cm3、10cm3、5cm3、3cm3、1cm3、
0.1cm3 or 0.01cm3 volume.Geography fence device can be dressed by individual.Geography fence device can be carried at pocket,
In handbag, pouch, wallet, knapsack or any other individual article.
Geographical fence apparatus can be moved between position and position by means of individual.For example, user can pick up geography
Fence apparatus, it is moved to another location and is put down.Alternatively, user can be needed geography fence device from now
Have in object and separate, then pick up the geography fence device, be moved to another location and be affixed to new position
Place.Or geography fence device can be self-propelled.Geography fence device can be mobile.For example, geography fence fills
It can be another unmanned vehicle to put, or can be another apparatus of transport (for example, the apparatus of transport based on ground, based on water
Apparatus of transport, the apparatus of transport based on air, the apparatus of transport based on space).In some cases, geography fence device can
To be attached to unmanned vehicle or other apparatuss of transport or be supported by unmanned vehicle or other apparatuss of transport.Geography fence fills
The position put can be updated and/or tracked with its movement.
In some embodiments, geography fence device can be during use substantially stationary.Geography fence fills
Put and can be provided on object 1905 or on surface 1925.The object or person divine force that created the universe body that object can be naturally occurring.It is natural
The example of existing object can include the object of trees, shrub, stone, massif, mountain range or any other naturally occurring.It is artificial
The example of object can include structure (for example, building, bridge, post, fence, wall, bridge pier, buoy) or any other is artificial
Object.In one example, geography fence device can be provided on the structures such as the roof built.Surface can be certainly
Surface existing for so can be artificial surfaces.The example on surface can include floor surface (for example, landform, soil, broken
Stone, pitch, highway, floor) or surface (for example, lake, sea, river, small stream) based on water.
Alternatively, geography fence device can be unmanned vehicle bus stop.Geography fence device can be fixed to nobody
Aircraft bus stop.Geography fence device can be positioned on unmanned vehicle bus stop, or can be stopped by unmanned vehicle
Pull in support.Geography fence device can be a part for unmanned vehicle bus stop, or can be stopped with unmanned vehicle
Stand integrally formed.Unmanned vehicle bus stop can allow one or more unmanned vehicles to drop on bus stop or by stopping
Pull in support.The one or more of the weight that unmanned vehicle bus stop can include can be used for bearing unmanned vehicle are landed
Area.Unmanned vehicle bus stop can provide power to unmanned vehicle.In some cases, unmanned vehicle bus stop can be with
For being charged to one or more power cells (for example, battery) on unmanned vehicle machine.Unmanned vehicle bus stop can be with
For being swapped out with new power cell from unmanned vehicle power cell.New power cell can have higher energy to hold
Amount or state of charge.Unmanned vehicle bus stop can place under repair on unmanned vehicle or be carried for unmanned vehicle
For replacement part.Unmanned vehicle bus stop can receive the article carried by unmanned vehicle or can store and can be lifted
With the article carried by unmanned vehicle.
Geography fence device can be any kind of device.Described device can be computer (for example, individual calculus
Machine, laptop computer, server), mobile device is (for example, smart phone, cell phone, tablet PC, individual digital help
Reason) or any other type device.Described device can be can be by the network equipment of network service.Described device includes
One or more Memory Storage Units, the Memory Storage Unit can include non-transient computer-readable media, described
Medium can store code, logic or instruction, to perform other described one or more steps everywhere herein.The dress
One or more processors can be included by putting, and the processor can be according to non-transient computer-readable Jie as described herein
Code, logic or the instruction of matter and either individually or collectively perform one or more steps.
When device provides the reference point for the one group border associated with one group of air traffic control, described device can become
For geography fence device.In some cases, when software or application operate in can provide device position be used as be directed to and one group
When on the device of the reference point on one group of associated border of air traffic control, described device can be geography fence device.For example, with
Family can have the device for performing additional function, such as smart phone.It can will apply that be downloaded to can be with air traffic control system, certification system
The smart phone that another part or any other system of system communicate.Described in the application can provide to air traffic control system
The position of smart phone and indicate that the smart phone is geography fence device.Therefore, the position of smart phone can be
It is known and be determined for border that can be associated with limitation.Device can have locator or can use
Alignment system determines the position of described device.For example, it may be determined that smart phone and/or tablet PC or other movements
The position of device.Reference point can be provided using the position of mobile device, as geography fence device.
In some embodiments, geography fence device is designed to be provided in outdoor environment.Geography fence device
It is designed to stand various weathers.Geography fence device can have can partially or even wholly surround the geography fence
The shell of one or more parts of device.The shell can protect one or more of parts from wind, dust or drop
Water (for example, rain, snow, hail, ice).The shell of geography fence device may or may not be airtight, and can be
Or it can not be waterproof.The shell of geography fence device can surround one or more processing of the geography fence device
Device.The shell of geography fence device can surround one or more Memory Storage Units of the geography fence device.It is geographical
The shell of fence apparatus can surround the locator of the geography fence device.
In some embodiments, geography fence device can be arranged to the remote control for receiving user's input.
Remote control can control the operation of unmanned vehicle.When geography fence border is used to allow unmanned vehicle in the geography fence
When operation in border but limitation operation of the unmanned vehicle outside geography fence border, this can be with useful.For example, nobody flies
Row device can be only permitted to fly in geography fence border.If unmanned vehicle is toward or away from border, nothing can be changed
The flight path of people's aircraft is so that the unmanned vehicle is maintained within geography fence border.If unmanned vehicle only by
Permission is flown in geography fence border, then this can be such that the unmanned vehicle is maintained in the distance to a declared goal away from remote control.
This can help user to be easier to monitor unmanned vehicle.This can prevent unmanned vehicle from flying and being confused beyond desired distance
Road.If geography fence device is remote control, user be able to can walk everywhere and geography fence device border can be with
Remote control moves together.Therefore, user can have certain free degree freely to travel through region, while unmanned vehicle is maintained at
Relative in the expectation border of the user.
Geography fence border can include one or more horizontal boundaries.For example, geography fence border can be two-dimensionally
Area, the two-dimentional area can limit the transverse dimensions in the space in geography fence border and the space outside geography fence border.
Geography fence border may or may not include height border.Geography fence border can limit three-D volumes.
Figure 19 provides the diagram in terms of geography fence border 1920 wherein may include lateral aspects and height.For example,
One or more horizontal boundaries can be provided.Upper height limit and/or lower limit can be provided.For example, upper height limit can limit side
The top on boundary.Height lower limit can be with the bottom of limited boundary.Border can be substantially flat, or can be bending,
It is inclined or there is any other shape.Some borders can have cylindrical, prismatic, conical, spherical, hemispherical, bowl
Shape, annular, tetrahedroid or any other shape.In a diagram, unmanned vehicle can be not allowed on geography fence side
Flown within boundary.Unmanned vehicle can the free flight outside geography fence border.Therefore, unmanned vehicle can be in Figure 19
More than the upper height limit of middle offer fly.
In some embodiments, geo-fencing system can be provided.Geo-fencing system can be the son of air traffic control system
System.In some cases, air traffic control system can include the geography fence that can perform one or more examples described herein
Module.Any description to geo-fencing system herein goes for geography fence module, and the geography fence module can be with
It is a part for air traffic control system.Geography fence module can be a part for Verification System.Or geo-fencing system can be with
Verification System or air traffic control system separate and/or independently of Verification System or air traffic control system.
Geo-fencing system can receive the application to setting up geography fence device.For example, when geographical fence apparatus is nothing
During a part for people's aerocraft system, it can be identified and/or tracked.Geography fence device can have unique body
Part.For example, geography fence device can have unique geography fence identifier, the geography fence identifier can be from other
The geography fence device is uniquely identified and/or distinguished in geography fence device.It can collect on geography fence device
Identity information.Such information can include the information on geography fence type of device.Geography fence device identification can
For determining geographical fence apparatus type.In this paper, other can be provided on the further of geography fence type of device everywhere
Description.
In some embodiments, geography fence device identification can be provided from ID registration centers.ID registration centers are also
User identifier and/or unmanned vehicle identifier (for example, the ID registration centers 210 illustrated in Fig. 2) can be provided.Or
Geography fence device can use the ID registration center mutually separated with unmanned vehicle and/or user.Therefore, can be with identified geographic
Fence apparatus.When geographical fence apparatus is when setting up application and passing through geo-fencing system, then the geography fence dress can be identified
Put.
In some embodiments, geography fence device can also be by certification.Certification to geographical fence apparatus can be with
It is as the geography fence device indicated by geography fence device identification to include validating that the geography fence device.It can use and appoint
What authentication techniques is authenticated to geographical fence apparatus.For any skill being authenticated to unmanned vehicle and/or user
Art can be used for being authenticated geographical fence apparatus.Geography fence device can have geography fence device keys.In certification
The geography fence device keys can be used during process.In some cases, AKA processes can be used for helping to enclose geography
The certification of column device.The further possibility for being authenticated to geographical fence apparatus is described in further detail in other everywhere herein
Process.Geo-fencing system can prevent from cloning geography fence device.Geo-fencing system can prevent the geography fence of clone
The certification that device passes through aerial management system (for example, air traffic control system) and unmanned vehicle.Certified geography fence device can
To be used and can be communicated with unmanned vehicle by air traffic control system.
Geo-fencing system can track to have gone through to be enclosed on the geography of the registration process of geography fence apparatus system
The identity of column device.Before on geography fence apparatus system successful registration geography fence device, the geography can be enclosed
Column device is authenticated.In some cases, geography fence device on geography fence device subsystem register once.Or
Registration can occur repeatedly.When being powered geography fence device, the geography fence device can be identified and/or be recognized
Card.In some cases, geography fence device can remain powered on during use.In some cases, geography fence device
It can power off.When geographical fence apparatus powers off and is then re-energised, it can undergo mark and/or verification process to set up
In systems.In some cases, only present power-up geography fence device is just tracked by system.With once setting up but currently
The relevant data of the geography fence device that is not powered on can be stored by system.When device powers off, it is without tracked.
Geo-fencing system can check and determine useful space scope, duration and/or the limit of geographical fence apparatus
Property rank processed.For example, the position of geography fence device can be tracked.In some cases, geography fence device can be reported voluntarily
Accuse their position.In some cases, geography fence device can have a position tracker, such as GPS unit or one
Or multiple sensors.Geography fence device can transmit the information on geography fence setting position to geo-fencing system.Institute
Rheme puts the coordinate that can include geography fence device, such as world coordinates or local coordinate.
Geo-fencing system can be with recording needle to the geography fence border of each in geographical fence apparatus.Geography fence fills
Put can be with same type border or can be with different types of border.For example, the border between device and device can
With difference.Geo-fencing system can record boundary types and the position of geography fence device.Therefore, geo-fencing system can be with
It can determine the position on the border of geography fence device.The useful space scope of geography fence device can be by the system
Know.
The duration on geography fence device border can be known.In some embodiments, geography fence border
It can keep static over time.As long as geography fence device is powered, the geography fence border can is kept it turned on.
In other cases, geography fence border can change over time.Even when geographical fence apparatus is powered, geography encloses
Column border can have identical scope, but can come into force or can not come into force., can be with for example, daily from 2pm to 5pm
Geography fence border is provided, and during remaining hour, geography fence border does not come into force.The shape of geography fence border and/or
Size can change over time.Geography fence border change can based in one day sometime, in one week
The a certain week in some day, one month, month, season, season, time or any other time correlation in some day, one month
Factor.The change can be rule or periodic.Or the change can be irregular.In some cases,
The timetable that the change of geography fence border can follow can be provided.Other provide change geography and enclosed in more detail everywhere herein
The further example and diagram on column border.
The rank of geography fence device can be known by geography fence subsystem.To the ranks of various air traffic control in the early time
Description goes for the rank of geography fence device.For example, if multiple geography fence devices have overlapping spatial dimension,
The overlapping range can be then treated according to rank.For example, the tof tube on the geography fence device with higher level
System goes for the overlapping area.Or restricted higher air traffic control can be used in the overlapping area.
Geo-fencing system can determine how to announce geography fence device.In some cases, geography fence device can
To send signal.The signal can be used for detecting geography fence device.Unmanned vehicle be able to can detect to be enclosed from geography
The signal of column device is to detect the geography fence device.Or unmanned vehicle can not can directly detect geography fence
Device, but geo-fencing system can detect geography fence device.Logger, such as other described notes everywhere herein
Record device, it may be possible to detect geography fence device.Air traffic control system can detect geography fence device.Geography fence device energy
It is enough to announce in any way.It is, for example, possible to use electromagnetic signal or sound and light signal announce geography fence device.Can be by means of
Vision sensor, infrared sensor, Ultraviolet sensor, sound transducer, magnetometer, radio receiver, WiFi receiver or
The sensor or receiver of any other type detects the signal from geography fence device.Geo-fencing system can track
Which geography fence device uses which type of signal.Which kind of class geo-fencing system can provide on geography fence device
The signal of type and inform other one or more devices or system (for example, unmanned vehicle), so as to using correctly passing
Sensor detects geography fence device.Geography fence information can also be tracked in such as frequency range, bandwidth and/or transmission signal
The information such as the agreement used.
Geo-fencing system can be managed for unmanned vehicle flight based on the information from geography fence device
Resource pool.Geography fence device can be to unmanned vehicle operation apply one or more control.For example, geography can be based on
Fence apparatus flies to limit unmanned vehicle.The example of resource can be available spatial domain.Can be based on geography fence device
Position and/or border can use spatial domain to limit., can with spatial information (si) during the resource for unmanned vehicle is distributed
To be used by air traffic control system.Can be with real-time update with spatial domain., can be by for example, geography fence device can open or close
Addition removes, and can move, or the border of geography fence device can change over time.Therefore, spatial domain can be used
It can change over time.Can be with real-time update with spatial domain.Constantly or it can be updated periodically with spatial domain.It can use
Spatial domain can update with rule or irregular time interval or according to timetable.Can be in response to event (such as to money
The request in source) and spatial domain can be used by updating.In some cases, can over time and predict can use spatial domain.If for example, ground
It is known in advance to manage fence apparatus timetable, then some changes in spatial domain can be predictable.Therefore, when user is inciting somebody to action
During asking the resources such as spatial domain, it can be estimated that the available spatial domain predicted.In some embodiments, difference can be provided
Grade.For example, the different operating grade of user can be provided.Operation grade based on user, different resource can be with for user
It is available.For example, the limitation of some geography fences can be only applicable to certain user and not be suitable for other users.User type
Available resources can be influenceed.Another example of grade can include unmanned vehicle type.Unmanned vehicle type can influence
Available resources.For example, the limitation of some geography fences can be only applicable to some unmanned vehicle models and not be suitable for other nothings
People's aircraft model.
When user wishes to operate unmanned vehicle, the request to one or more resources can be made.In certain situation
Under, resource can include some spaces in a period of time.Resource can include device, and such as other are described everywhere herein
Those devices.Based on available resources, it can receive or refuse flight plan.In some cases, can be provided to flight plan
Some changes are with accordance with available resources.It is determined that during Resource Availability, geography fence device information can be useful.
During determining whether to receive, refuse or change proposed flight plan, geography fence device information can be useful
's.
User can interact with geo-fencing system.User can inquire about geography fence system on the assignment of resource
System.For example, user, which can ask to assign, can use spatial domain or the state of other resources.User, which can ask to assign, corresponds to user etc.
The state in the available spatial domain of level (for example, operation grade, user type).User, which can ask to assign, corresponds to unmanned vehicle class
The state in the available spatial domain of type or other characteristics.In some cases, user can be withdrawn on resource from geo-fencing system
The information of assignment.In some cases, information can be presented in a graphic format.For example, the ground for showing available spatial domain can be provided
Figure.The map can show the available spatial domain when the current point in time that user is inquired about, or may infer that user looks into
Available spatial domain during future time point after inquiry.The map can show the position and/or border of geographical fence apparatus.This
Text other (for example, Figure 35) can in more detail be provided user interface is further described everywhere, the user interface can be with
Geographical fence apparatus and/or available resources are shown.
In some embodiments, violation counter system can be provided.Violation counter system can be the son of air traffic control system
System.Air traffic control system can include the violation counter module of executable one or more actions described herein.Herein to disobeying
Rule counter system any description go for can be a part for air traffic control system violation counter module.Counter mould in violation of rules and regulations
Block can be a part for Verification System.Or violation counter system can be separated with Verification System or air traffic control system and/or
Person is independently of Verification System or air traffic control system.
Violation counter system can track unmanned vehicle activity.For example, the position of unmanned vehicle can be tracked.Nobody
The position of aircraft can include the direction of unmanned vehicle.Tracking the position of unmanned vehicle can also fly including tracking nobody
The movement (for example, point-to-point speed, translational acceleration, angular speed, angular acceleration) of row device.Other of unmanned vehicle can be tracked
Operation, the operation of such as payload, the positioning of payload, the operating of carrier, one or more unmanned vehicle sensors
Operation, the operation of communication unit, the operation of navigation elements, any other activity of power attenuation or unmanned vehicle.In violation of rules and regulations
Counter system can detect when unmanned vehicle shows exception.Violation counter system can detect when unmanned vehicle is carried out
The behavior of one group of air traffic control is not observed.It is determined that unmanned vehicle is observed still not in accordance with the process of one group of air traffic control
In, it may be considered that user identity and/or unmanned vehicle identity.It is determined that unmanned vehicle, which is observed, does not still observe described one group
During air traffic control, it may be considered that geography fence data.For example, violation counter system can detect it is unwarranted nobody
When aircraft is appeared in limited spatial domain.Limited spatial domain can be provided in the border of geography fence device.User and/or nothing
People's aircraft can be not authorized to enter limited spatial domain.However, it is possible to detect the unmanned vehicle proximal or into limited spatial domain
Presence.Can be with the activity of real-time tracking unmanned vehicle.Can continue tracking, periodically tracking, according to timetable tracking or
Person tracks unmanned vehicle activity in response to the event or the situation that detect.
When unmanned vehicle will be engaged in the activity do not observed for one group of air traffic control of the unmanned vehicle, disobey
Rule counter system can send warning.For example, if unwarranted unmanned vehicle will enter limited spatial domain, can carry
For warning.The warning can provide in any way.In some cases, warning can be electromagnetism warning or acousto-optic warning.
Warning can be provided to the user of unmanned vehicle.Warning can be provided via user terminals such as remote controls.Can be to
Air traffic control system and/or unmanned vehicle provide warning.The chance for changing unmanned vehicle behavior can be provided a user so that institute
State unmanned vehicle and observe air traffic control.For example, if unmanned vehicle can have one close to limited spatial domain, user
A little times change the path of unmanned vehicle to avoid the limited spatial domain.Or it can not provide a user and change nobody
The chance of aircraft behavior.
Violation counter system can be such that flight responsive measures are realized by unmanned vehicle.Flight responsive measures can come into force with
Unmanned vehicle is set to observe one group of air traffic control., can be more for example, if unmanned vehicle comes into limited area
Change the flight path of unmanned vehicle so that the unmanned vehicle leaves limited area immediately, or drops unmanned vehicle
Fall.Flight responsive measures can be can override one or more user input compulsory measure.Flight responsive measures can be machine
Tool, electromagnetism or acousto-optic measure or the adapter control to unmanned vehicle.If warning is invalid, the measure can fly nobody
Row device is dislodged, catches or even smashed.For example, the measure can be automatically led to unmanned vehicle flight path more
Change.The measure can make unmanned vehicle land automatically.The measure can make unmanned vehicle power-off or self-destruction.It can adopt
With any other flight responsive measures, such as other described those flight responsive measures everywhere herein.
Counter system can be with information of the recording and tracking on unmanned vehicle activity in violation of rules and regulations.It can record and/or store
Various types of information on unmanned vehicle.In some embodiments, described information can be stored in memory storage
In system.All information on unmanned vehicle activity can be stored.Or it can store on unmanned vehicle activity
The subset of information.In some cases, the information recorded can aid in be traced afterwards.The information recorded can be used for taking charge of
Method purpose.In some cases, the information recorded can be used for disciplining action as a warning.For example, event may occur.Institute can be traced
Record, relevant with event information.Described information is determined for how the event occurs or why occur
Details.If the reason for event is accident, and described information is determined for accident.Described information can be used for assigning
For the mistake of accident.If for example, a side is responsible for the accident, described information is determined for the side in fault.
If the side is in fault, it can carry out and discipline action as a warning.In some cases, different degrees of mistake may be shared in many ways.
Action can be disciplined as a warning to assign according to the information recorded.In another example, the event can be that unmanned vehicle is not abided by
Keep the action of one group of air traffic control.For example, unmanned vehicle can fly through the area for not allowing photography.However, the nothing
People's aircraft may use cameras capture image.After warning is sent, the unmanned vehicle may be with certain side
Formula continues to catch image.Described information can be analyzed with determine the unmanned vehicle catch image up to how long or catch
The image type arrived.Event can be the abnormal behaviour shown by unmanned vehicle.If unmanned vehicle shows exception
Behavior, then it can analyze the reason for described information is to determine abnormal behaviour.It is remotely controlled for example, if unmanned vehicle performs with user
The unmatched action of order that device is sent, then can analyze described information and how to be performed with to determine the unmanned vehicle or why
Perform the action.
In some embodiments, the information recorded can be not modifiable.Alternatively, private user may not
The recorded information of enough changes.In some cases, only storage system and/or in violation of rules and regulations counter system manipulator or
Manager can be able to access that recorded information.
Communication type
Unmanned vehicle and geo-fencing system can interact in unmanned vehicle system.Geography fence device can
To provide one or more geography fence borders, the geography fence border can influence the available spatial domain for unmanned vehicle
And/or unmanned vehicle in spatial domain when the activity that can perform or can not perform.
Figure 39 shows different types of logical between unmanned vehicle and geography fence device according to embodiment of the present invention
Letter.Geography fence device can be online 3910 or can be offline 3920.Geography fence device can be only from nobody
Aircraft reception signal 3930, signal 3940 only can be sent to unmanned vehicle, or both can be sent to unmanned vehicle
Signal is again from unmanned vehicle reception signal 3950.
When geographical fence apparatus is connected to authentication center (for example, when communicating therewith letter), the geography fence device can
To be online 3910.When geographical fence apparatus is connected to any part of Verification System (for example, when communicating therewith letter), institute
It can be online to state geography fence device.When geographical fence apparatus is connected to air traffic control system or its module (for example, geography fence
Module, in violation of rules and regulations counter module) when (when communicating therewith letter), the geo-fencing system can be online.When geography fence fills
Put when being connected to network, the geography fence device can be online.When geographical fence apparatus is connected directly to another device
When, the geography fence device can be online.When geographical fence apparatus can communicate with another device or system, institute
It can be online to state geography fence device.
When geographical fence apparatus is not connected to authentication center (for example, when not communicating therewith letter), the geography fence dress
It can be offline 3920 to put.When geographical fence apparatus is not connected to any part of Verification System (for example, not communicating therewith
During letter), the geography fence device can be offline.When geo-fencing system is not connected to air traffic control system or its module (example
Such as, geography fence module, in violation of rules and regulations counter module) when (for example, when not communicating therewith letter), the geo-fencing system can be from
Line.When geographical fence apparatus is not connected to network, the geography fence device can be offline.When geographical fence apparatus
When being not directly connected to another device, the geography fence device can be offline.When geographical fence apparatus can not with it is another
When one device or system communicate, the geography fence device can be offline.
Geography fence device can communicate with unmanned vehicle.Communication between geography fence device and unmanned vehicle
It can occur in many ways.For example, communication can be via channel, signaling mode, access mode, signal format or signaling format
And occur.Communication between geography fence device and unmanned vehicle can be direct or can be indirect.At some
In the case of, can only with direct communication, only with indirect communication or can use direct communication and indirect communication two
Person.Other provide the further example and details on direct communication and indirect communication everywhere herein.
When geographical fence apparatus is only from unmanned vehicle reception signal 3930, indirect communication can be used.When geography encloses
When column device is online, indirect communication can include the signal to unmanned vehicle.It is for instance possible to use network with by signal from ground
Reason fence apparatus is sent to unmanned vehicle.When geographical fence apparatus is offline, indirect communication can include recorded nobody
The presence of aircraft.Geography fence device can detect the presence of unmanned vehicle or receive the presence of unmanned vehicle
Indirect communication.
When geographical fence apparatus only sends signal 3940 to unmanned vehicle, direct communication can be used.It can use
Direct communication is regardless of whether geography fence device is online or offline.Even if geography fence device not with Verification System or its
Part communicates, and the geography fence device can also can be with unmanned vehicle direct communication.Geography fence device can
To send direct communication to unmanned vehicle.Geography fence device can provide direct communication via wireless signal.It is directly logical
Letter can be the signal of electromagnetic signal, sound and light signal or any other type.
When geographical fence apparatus is not only sent but also receive and the signal of unmanned vehicle 3950 (for example, carrying out two-way communication)
When, direct communication or indirect communication can be used.In some cases, it can simultaneously use and directly or indirectly communicate.Geography encloses
Column device and unmanned vehicle can switch using between direct communication and indirect communication.Direct communication or indirect can be used
Communication is regardless of whether geography fence device is online or offline.In some embodiments, direct communication can be used for from
Geography fence device is to a part for the two-way communication of unmanned vehicle, and indirect communication can be used for from unmanned vehicle to ground
Manage a part for the two-way communication of fence apparatus.For from unmanned vehicle to one of the two-way communication of geography fence device
Point, indirect communication can include when geographical fence apparatus is online to the signal of unmanned vehicle, and can include when geography
The presence of the unmanned vehicle recorded when fence apparatus is offline.Or can convertibly using direct communication with connect
Letter is without considering direction.
Alternatively, rule of communication can be stored in the memory on geography fence device.Alternatively, on one group or
One or more rules of multigroup air traffic control can be stored on geography fence device.Geography fence device can or
Person can not connect network, such as internet, any other WAN, LAN, communication network or data network.If geography encloses
Column device can be connected to network, then geography fence device is without the rule is stored in memory.For example, rule of communication
It need not be stored on geography fence device.Or need not storage on the one or more rule of one or more groups of air traffic control
Exist on geography fence device.Geography fence device can be stored on single device or memory by network to access
Rule.
Geography fence device memory can store geography fence mark and/or authentication information.For example, geography fence device
Memory can store geographical fence apparatus identifier.Memory can store geographical fence apparatus key.Correlation can be stored
Algorithm.Geography fence device identification and/or key cannot be changed.Alternatively, geography fence device identification and/or close
Key can be outside unreadable.Geography fence device identification and/or key can store in the module, and the module can be with
It can not be separated with geography fence device.The module can not be in the case where not damaging the function of geography fence device from institute
State the removal of geography fence device.In some cases, geography fence mark and/or authentication information can be stored in geography fence dress
On putting, and it is unrelated whether can to access network with geography fence device.
Geography fence device can include communication unit and one or more processors.One or more of processors
Any step or function of geography fence device can either individually or collectively be performed.Communication unit can allow direct communication,
Indirect communication or direct communication and indirect communication.Communication unit and one or more can be provided on geography fence device
Processor, and it is unrelated whether can to access network with geography fence device.
In some embodiments, unmanned vehicle can be offline or online.Unmanned vehicle can be offline
(for example, being not connected to Verification System).When offline, unmanned vehicle can not be with any part phase of Verification System
Communication, the part is such as authentication center, the module of air traffic control system or air traffic control system (for example, geography fence module,
Violation counterattacking measure module).When unmanned vehicle is not connected to network, the unmanned vehicle can be offline.Work as nothing
When people's aircraft is not directly connected to another device, the unmanned vehicle can be offline.When unmanned vehicle can not
When being communicated with another device or system, the unmanned vehicle can be offline.
When unmanned vehicle can be offline, digital signature method can be used in the communications.Certificate is issued and used
It can be used for communicating.Such method can provide some safety measures to the communication with unmanned vehicle.It can provide so
Safety communicated without unmanned vehicle and Verification System.
When unmanned vehicle is connected to any module of such as authentication center, air traffic control system or authentication center (for example, geographical
Rail module, violation counterattacking measure module) etc. any part of Verification System when (for example, when communicating therewith letter), it is described
Unmanned vehicle can be online.When unmanned vehicle is connected to network, the unmanned vehicle can be online.When
When unmanned vehicle is connected directly to another device, the unmanned vehicle can be online.When geographical fence apparatus can
When being communicated with another device or system, the unmanned vehicle can be online.
When unmanned vehicle is online, various communication means or technology can be used.For example, unmanned vehicle and/or use
Family can receive geography fence signal, and certification can be performed at the authentication center of Verification System.Certification can be directed to ground
Fence apparatus is managed, it can confirm that the geography fence device is authenticated and authorized.In some cases, can confirm that
Geography fence device is abide by the law standard.In some cases, certified geography fence device can inform unmanned vehicle
And/or user is on one or more groups of air traffic control.Air traffic control system can inform unmanned vehicle and/or user in response to
Certified geography fence device and the one or more groups of air traffic control applied.
Figure 20, which shows directly to be transmitted to unmanned vehicle according to the device of geography fence wherein of embodiment of the present invention, to be believed
The system of breath.Geography fence device 2010 can be received with transmission signal 2015, the signal by unmanned vehicle 2030.Ground
Reason fence apparatus can have geography fence border 2020.Geography fence device can include communication unit 2040, memory list
Member 2042, detector 2044 and one or more processors 2046.Communication can be used for transmission signal.Detector can be used for
Detect the presence 2050 of unmanned vehicle.
Geography fence device 2010 can be with broadcast wireless signal 2015.The broadcast can continue to occur.The broadcast can
To occur independent of any condition detected.The broadcast mode can be advantageously simple.Or when detecting just
In close unmanned vehicle 2020, the broadcast to signal can occur.In other times, broadcast is without occurring.This can be with
Advantageously save Radio Resource.Geography fence device can remain hidden, until detecting unmanned vehicle.
The aspect of the present invention can be related to geography fence device 2010, including:Communication module 2040, it is configured for
In the predetermined geographic scope internal transmission information of the geography fence device;And one or more memory cell 2042, its by with
One or more groups of air traffic control for storing or receiving the predetermined geographic scope for the geography fence device are set to, wherein
When unmanned vehicle enters the predetermined geographic scope of the geography fence device, the communication module is configured for nothing
People's aircraft sends one group of air traffic control in one or more groups of air traffic control.It can provide a kind of to unmanned flight
The method that device provides one group of air traffic control, methods described include:Stored up in one or more memory cell of geography fence device
Deposit or receive one or more groups of air traffic control of the predetermined geographic scope for the geography fence device;And by means of by with
The communication module for the predetermined geographic scope internal transmission information in the geography fence device is set to, when unmanned vehicle enters
Send and come from one or more groups of air traffic control to unmanned vehicle during the predetermined geographic scope of the geography fence device
One group of air traffic control.
Geography fence device 2010 can detect the presence of unmanned vehicle 2020.Alternatively, the inspection of geography fence device
Surveying device 2044 can broadcast to detect the presence of unmanned vehicle.
In some embodiments, geography fence device can be by identifying unmanned vehicle to detect via visual information
Unmanned vehicle.For example, geography fence device visually can detect and/or identify the presence of unmanned vehicle.At some
In the case of, the vision sensor of camera or other forms is provided as the detector of unmanned vehicle.Work as unmanned vehicle
When in into the preset range of geography fence device, camera can detect the unmanned vehicle.In some cases, ground
The detector of reason fence apparatus can include multiple cameras or vision sensor.Multiple cameras or vision sensor can have not
The same visual field.Camera can catch the image of unmanned vehicle.Described image can be analyzed to detect unmanned vehicle.At some
In the case of, described image can be analyzed to detect the existence or non-existence of unmanned vehicle.Can with analysis chart picture with determination nobody
Estimated distance of the aircraft away from geography fence device.Can be with analysis chart picture to detect unmanned vehicle type.For example, it can distinguish
The different model of unmanned vehicle.
In unmanned vehicle is identified, the information in any part from electromagnetic spectrum can be used.For example, except can
See spectrum, other spectrum from unmanned vehicle can also be analyzed to detect and/or identify the presence of unmanned vehicle.One
In the case of a little, detector can be infrared detector, UV-detector, microwave detector, radar or detectable electromagnetic signal
Any other type device.When unmanned vehicle enters in the preset range of geography fence device, detector can energy
Enough detect the unmanned vehicle.In some cases, multiple sensors can be provided.Multiple sensors can have different
The visual field.In some cases, the electromagnetic image or signature of unmanned vehicle can be detected.Can analyze described image or signature with
Detect the existence or non-existence of unmanned vehicle.Described image or signature can be analyzed to estimate unmanned vehicle away from geography fence
The distance of device.Described image or signature can be analyzed to detect unmanned vehicle type.For example, can distinguish different model or
Unmanned vehicle.In one example, the first unmanned vehicle model type, which can have, is different from second unmanned flight's type
The heat signature (heat signature) of number type.
Geography fence device can be by identifying unmanned vehicle to detect unmanned flight via acoustic intelligence (for example, sound)
Device.For example, geography fence device can acoustically detect and/or identify the presence of unmanned vehicle.In some cases, examine
The sonic transducer of microphone, sonar, sonac, shock sensor and/or any other type can be included by surveying device.Work as nothing
When people's aircraft is entered within the preset range of geography fence device, detector can detect the unmanned vehicle.Inspection
Multiple sensors can be included by surveying device.Multiple sensors can have the different visuals field.Sensor can catch unmanned vehicle
Acoustic signature (acoustic signature).Acoustic signature can be analyzed to detect unmanned vehicle.Can analyze acoustic signature with
Detect the existence or non-existence of unmanned vehicle.Acoustic signature can be analyzed to determine unmanned vehicle estimating away from geography fence device
Count distance.Acoustic signature can be analyzed to detect unmanned vehicle type.For example, the different model of unmanned vehicle can be distinguished.
In one example, the first unmanned vehicle model type can have the sound different from the second unmanned vehicle model type special
Sign.
Geography fence device can be identified by monitoring one or more wireless signals from unmanned vehicle
Close unmanned vehicle.When unmanned vehicle enters scope, the unmanned vehicle can be broadcasted alternatively can be by geography
The wireless signal that fence apparatus detects.The detector of unmanned vehicle can be connecing for the wireless signal from unmanned vehicle
Receive device.Detector can be alternatively the communication unit of unmanned vehicle.Transmission signal can be carried out simultaneously using same communication unit
And radio communication of the detection from unmanned vehicle.Or transmission signal can be carried out using different communication units and detected to come
From the radio communication of unmanned vehicle.The wireless data that is captured by detector can be analyzed to detect the presence of unmanned vehicle
Or it is not present.Wireless data can be analyzed to estimate distance of the unmanned vehicle away from geography fence device.For example, when can analyze
Between difference or signal intensity to estimate distance of the unmanned vehicle away from geography fence device.Wireless data can be analyzed to detect nobody
Type of aircraft.In some cases, wireless data can include data of the mark on unmanned vehicle, such as unmanned flight
Device identifier and/or unmanned vehicle type.
In some cases, geography fence device can be based on from any other of air traffic control system or Verification System composition
Partial information detects unmanned vehicle.For example, when air traffic control system detects unmanned vehicle close to geographical fence apparatus,
Air traffic control system can track the position of unmanned vehicle and can send signal to geography fence device.In other cases,
Air traffic control system can send the positional information on unmanned vehicle to geography fence device, and geography fence device can be made
Go out determination of the unmanned vehicle close to the geography fence device.In some embodiments, detector can receive
From the communication unit of the data of air traffic control system.
Unmanned vehicle can send or can not send any information on unmanned vehicle 2020.In some feelings
Under condition, unmanned vehicle can send radio communication.Radio communication can be detected by the detector on geography fence device.Nothing
Line communication can include the information broadcasted by unmanned vehicle.The information broadcasted by unmanned vehicle can announce unmanned vehicle
Presence.It can provide or the additional information on unmanned vehicle identity can not be provided.In some embodiments, close
It can include unmanned vehicle identifier in the information of unmanned vehicle identity.Described information can include on unmanned vehicle
The information of type.Described information can include the positional information of unmanned vehicle.For example, can to broadcast its current for unmanned vehicle
World coordinates.Unmanned vehicle can broadcast any other attribute, the parameter or unmanned vehicle class of such as unmanned vehicle
Type.
In some embodiments, unmanned vehicle can establish the communication with geography fence device, and can believe
The exchange of breath.Communication can include one-way communication or two-way communication.Communication can include enclosing on unmanned vehicle identity, geography
Column device identity, unmanned vehicle type, geography fence type of device, unmanned vehicle position, geography fence setting position, side
Geography fence type of device, the information of air traffic control or the information of any other type on boundary.
Geography fence device can know unmanned vehicle by the detector on the geography fence device
In the presence of.Geography fence device can know the presence of unmanned vehicle by the information from other devices.For example, blank pipe
System (for example, geography fence module, violation counterattacking measure module), authentication center, another geography fence device, it is another nobody fly
Row device can provide the existing information on unmanned vehicle to geography fence device.
The detector of geography fence device may be configured for detecting nobody in the preset range of geography fence device
The presence of aircraft.In some implementations, detector may detect the presence of unmanned vehicle outside the predetermined range.When nobody
When aircraft is located within preset range, detector can have the very high existing possibility for detecting unmanned vehicle
Property.When unmanned vehicle is located within the preset range of geography fence device, detector can have more than 80%, 90%,
95%th, 97%, 99%, 99.5%, 99.7%, 99.9% or 99.99% possibility for detecting unmanned vehicle.Geography encloses
The preset range of column device can be when unmanned vehicle is located in the preset distance away from geography fence device.Geography fence fills
The preset range put can have circular, cylinder, hemispherical or spherical form relative to the geography fence device.Or
Preset range can have any shape relative to geography fence device.Geography fence device may be provided in preset range
The heart.Or geography fence device can be offset from the center of preset range.
The preset range of geography fence device can include the distance of any magnitude.For example, geography fence device is predetermined
Scope can 1 meter, 3 meters, 5 meters, 10 meters, 15 meters, 20 meters, 25 meters, 30 meters, 40 meters, 50 meters, 70 meters, 100 meters, 120 meters, 150
Rice, 200 meters, 300 meters, 500 meters, 750 meters, 1000 meters, 1500 meters, 2000 meters, 2500 meters, 3000 meters, 4000 meters, 5000m,
In 7000 meters or ten thousand metres.
The communication unit of geography fence device may be configured in the preset range of geography fence device to nobody
Aircraft transmits information.Communication unit may be configured for continuous transmission information, periodically transmit information, according to timetable
To transmit information or transmit information when detecting event or situation.Transmitted information can be broadcasted with allow its by
Unmanned vehicle receives.If other devices are located within preset range, it can also receive information.Or only select
Fixed device can be with receive information, even if when within the scope of they are located at.In some implementations, communication unit may be to pre-
Determine the unmanned vehicle transmission information outside scope.When unmanned vehicle is located within preset range, communication unit can have
Very high, communication reaches the possibility of unmanned vehicle.When unmanned vehicle be located at geography fence device preset range it
When interior, communication unit can have more than 80%, 90%, 95%, 97%, 99%, 99.5%, 99.7%, 99.9% or
99.99%, successfully to the unmanned vehicle transmit information possibility.
When detecting the presence of unmanned vehicle, the communication unit of geography fence device may be configured in geography
The preset range internal transmission information of fence apparatus.The presence for detecting unmanned vehicle can be initiated from geography fence device
Transmit the event or situation of information., can be with described in transmission primaries or continuous transmission after the presence of unmanned vehicle is detected
Information.In some cases, when unmanned vehicle is rested within the preset range of geography fence device, can constantly or
Periodically information is transmitted to unmanned vehicle.
In some embodiments, one group of air traffic control can be included by transmitting to the information of unmanned vehicle.Can be on ground
Manage and one group of air traffic control is generated at fence apparatus.One group of tof tube can be generated by being selected from multigroup air traffic control
System.One group of air traffic control can be generated from the beginning at geography fence device.One group can be generated by means of user's input
Air traffic control.One group of air traffic control can combine the feature in multigroup air traffic control.
One group of air traffic control can be generated based on the information on unmanned vehicle.For example, unmanned flight can be based on
Device type and generate one group of air traffic control.Unmanned vehicle type can be based on and one group of flight is selected from multigroup air traffic control
Control.Unmanned vehicle identifier can be based on and generate one group of air traffic control.Can be based on unmanned vehicle identifier and from
One group of air traffic control is selected in multigroup air traffic control.One group of air traffic control can be generated based on the information on user.For example,
User type can be based on and generate one group of air traffic control.User type can be based on and one group is selected from multigroup air traffic control
Air traffic control.User identifier can be based on and generate one group of air traffic control.User identifier can be based on and from multigroup flight
Multiple air traffic control are selected in control.The air traffic control generation technique of any other type can be utilized.
Geography fence device may be configured for receiving unmanned vehicle identifier and/or user identifier.Nobody flies
Row device identifier can uniquely identify out the unmanned vehicle from other unmanned vehicles.User identifier can be from it
The user is uniquely identified out in his user.Unmanned vehicle identity and/or user identity can obtain certification.It is geographical
The communication module of fence apparatus can receive unmanned vehicle identifier and/or user identifier.
When unmanned vehicle enters the preset range of geography fence device, communication module can change communication mould
Formula.Communication module can be the communication module of geography fence device.Or communication module can be the communication mould of unmanned vehicle
Block.Before unmanned vehicle enters the preset range of geography fence device, communication module can be grasped under the first communication pattern
Make.When unmanned vehicle enters the preset range of geography fence device, communication module can switch to the second communication pattern.
In some embodiments, the first communication pattern is indirect communication pattern and the second communication pattern is direct communication pattern.For example, work as
When unmanned vehicle is located within the preset range of geography fence device, the unmanned vehicle can be via direct communication pattern
Communicated with the geography fence device.When outside unmanned vehicle is located at the preset range of geography fence device, the nothing
People's aircraft can communicate via indirect communication pattern and the geography fence device.In some embodiments, Ke Yi
Two-way communication is established between unmanned vehicle and geography fence device.Alternatively, when unmanned vehicle is located at geography fence device
Preset range within when, two-way communication can be established.When unmanned vehicle is located within the preset range of geography fence device
When, and be not alternatively when outside unmanned vehicle is located at the preset range of geography fence device, communication module can be
The preset range internal transmission information of geography fence device.When unmanned vehicle is located within the preset range of geography fence device
When, and be not alternatively when outside unmanned vehicle is located at the preset range of geography fence device, communication module can be
Receive information in the preset range of geography fence device.
The one or more processors 2046 of geography fence device can either individually or collectively be configured for generating
One group of air traffic control.It can use on the information for the multigroup air traffic control that can be stored on geography fence device and generate one
Group air traffic control.Processor can generate one group of air traffic control, and the processor can be deposited from one or more is stored in
One group of air traffic control is selected in multigroup air traffic control in storage unit 2042.Come from by combination and be stored in one or more
The air traffic control in multigroup air traffic control in memory cell, processor can generate one group of air traffic control.Or place
Reason device can use the information on the multigroup air traffic control that can be stored in outside geography fence device to generate one group of tof tube
System.In some cases, the information outside geography fence device can be pulled and received at geography fence device.It is geographical
Fence apparatus can permanently or temporarily store pulled information.The information pulled can be stored in short-term storage
In.In some cases, pulled information temporarily can be stored by buffering received information.
Geography fence device may or may not be that can be detected by unmanned vehicle.In some cases, ground
Reason fence apparatus can include the indicant that can be detected by unmanned vehicle.Indicant can be visual indicia, infrared markers,
Ultraviolet marking, acoustic signature, wireless signal or can be by the mark for any other type that unmanned vehicle detects.Herein its
He can provide the further detail below on detection of the unmanned vehicle to geographical fence apparatus in more detail everywhere.Unmanned flight
Device can receive one group of air traffic control in the case where not detecting geography fence device.Geography fence device can be need not
Unmanned vehicle detects the unmanned vehicle and to the unmanned vehicle in the case of detecting the geography fence device
Push one group of air traffic control or any other geography fence data.
One group of air traffic control can include one group of one or more geography fence border.Geography fence border can be used
In receiving unmanned vehicle or unmanned vehicle is prevented to enter.For example, one group of air traffic control can include allowing nobody to fly
One or more borders of row device flight in it.Unmanned vehicle can alternatively be not allowed to fly outside the border.
Or one group of air traffic control can include not allowing unmanned vehicle on one group of one or more border of its interior flight.
One group of air traffic control can apply or can not apply any height limitation.In some embodiments, described one group
Air traffic control can include not allowing the upper height limit that unmanned vehicle flies above it.One group of air traffic control can wrap
Include the height lower limit for not allowing unmanned vehicle to fly thereunder.
One group of air traffic control can include not allowing the unmanned vehicle to operate the effective of the unmanned vehicle
The condition of load.The payload of unmanned vehicle can be image capture device, and air traffic control can include not allowing
The unmanned vehicle catches the condition of image.It is within geography fence border that the condition, which can be based on unmanned vehicle,
Outside or.One group of air traffic control can include not allowing what unmanned vehicle communicated under one or more radio conditions
Condition.Radio condition can include one or more selected frequencies, bandwidth, agreement.The condition can be based on unmanned flight
Device be within the geography fence border or outside.
The one or more of the article that one group of air traffic control can include carrying unmanned vehicle limit.For example,
The limitation can be added in the type of the number of article, the size of article, the weight of article or article.The condition can be with base
In unmanned vehicle be within the geography fence border or outside.
One group of air traffic control can include the least residue battery capacity for being used for unmanned vehicle operation.Battery capacity
State of charge, residual non-uniformity, remaining flying distance, energy efficiency or any other factor can be included.The condition can
With based on unmanned vehicle be within the geography fence border or outside.
One group of air traffic control can include limiting the one or more of landing unmanned vehicle.The limitation can be with
Whether descent or unmanned vehicle including that can be realized by unmanned vehicle can land actually.The condition can be with base
In unmanned vehicle be within the geography fence border or outside.
It can provide such as other air traffic control of any other type in greater detail everywhere herein.It is one or more groups of to fly
Row control can be associated with the preset range of geography fence device.One or more groups of air traffic control are pre- with geography fence device
The one or more geography fence borders determined in scope are associated.In some embodiments, preset range can indicate that use
In detection unmanned vehicle and/or the scope communicated with unmanned vehicle.Geography fence border, which can indicate that, can delimit not
The border of biconditional operation, the different operating can by or can not be allowed by unmanned vehicle.Different rules can be applicable
Within geography fence border with outside.In some cases, the operation delimited without using preset range.Geography fence side
Boundary can finally align with preset range.Or geography fence border can be differently configured from preset range.Geography fence border can be with
Fall within the predetermined range.In some cases, some bufferings can be provided between preset range and geography fence border.Institute
State buffering and may insure that unmanned vehicle can receive one group of air traffic control before border is reached.
In one example, when unmanned vehicle is located within the preset range of geography fence device, unmanned vehicle
One group of air traffic control can be received.Unmanned vehicle can determine the geography fence for device from one group of air traffic control
Border be will appear from, and the unmanned vehicle is not allowed within the geography fence border.Unmanned vehicle can
With the unmanned vehicle reach geography fence border before, when the unmanned vehicle crosses geography fence border or
Person makes the determination shortly after the unmanned vehicle crosses geography fence border.Send to one group of unmanned vehicle
Air traffic control can include the instruction for allowing the unmanned vehicle not enter one or more of geography fence borders.Nobody flies
Row device can take flight responsive measures.For example, unmanned vehicle flight path can be automatically controlled to avoid one or more
Geography fence border.When unmanned vehicle enters one or more geography fence borders, can force automatically it is described nobody fly
Row device lands.When unmanned vehicle enters one or more geography fence borders, unmanned vehicle flight can be automatically controlled
Path is so that unmanned vehicle leaves the area closed by one or more geography fence borders.
Figure 21 is shown in which the system that air traffic control system can communicate with geography fence device and/or unmanned vehicle.
Geography fence device 2110 and unmanned vehicle 2120 can be provided in system.Air traffic control system 2130 can also be provided.It is geographical
Fence apparatus can provide the georeferencing for one or more geographical frontiers 2115.Geography fence device can include communication
Unit 2140 and detector 2142.Air traffic control system can include one or more processors 2150 and memory cell 2152.
Unmanned vehicle 2120 can be detected by the detector 2142 of geography fence device.It can use as other are each herein
Any technology of place description detects unmanned vehicle.When unmanned vehicle enters preset range, the nothing can be detected
People's aircraft.When unmanned vehicle enters preset range, there can be the high likelihood for detecting the unmanned vehicle.
Under certain situation, unmanned vehicle can be detected before preset range is entered.When unmanned vehicle enters preset range
When, one group of air traffic control can be provided to the unmanned vehicle.
One group of air traffic control can be generated at air traffic control system 2130.One group of air traffic control can by from it is multigroup can
Selection generates for one group of air traffic control of unmanned vehicle in air traffic control.Multigroup air traffic control can be stored in and deposit
In reservoir 2152.The one or more processors 2150 of air traffic control system can select one group of flight from multigroup air traffic control
Control.Air traffic control system can use any other air traffic control generation technique, including other described those tof tubes everywhere
Generation technique processed.
In some cases, geography fence device 2110 can be to the transmission signal of air traffic control system 2130, and the signal can be with
Triggering generates one group of air traffic control at air traffic control system.Can be by means of the communication unit 2140 of geography fence device to transmit
State signal.When geographical fence apparatus detects that unmanned vehicle is located within preset range, the geography fence device can be with
The signal is transmitted to air traffic control system.The detection being crossing to unmanned vehicle in preset range can be enclosed with triggering command from geography
Column device is transmitted to air traffic control system to generate one group of air traffic control for the unmanned vehicle.
In some embodiments, geography fence device can detect the letter on unmanned vehicle and/or user
Breath.Geography fence device can detect unmanned vehicle identifier and/or user identifier.Geography fence device can energy
Enough determine unmanned vehicle type or user type.Geography fence device can be transmitted on unmanned vehicle to air traffic control system
And/or the information of user.For example, geography fence device can be transmitted on unmanned vehicle type or user class to air traffic control system
The information of type.Geography fence device can transmit unmanned vehicle identifier and/or user identifier to air traffic control system.Geography encloses
Column device can transmit additional information to air traffic control system, such as environmental condition or by geography fence device caught or received
Any other data.
Air traffic control system can alternatively use the information from geography fence device to broadcast to generate one group of air traffic control.
For example, air traffic control system can be based on unmanned vehicle or user profile and generate one group of air traffic control.Air traffic control system can be based on
Unmanned vehicle type or user type and generate one group of air traffic control.Air traffic control system can be based on unmanned vehicle identifier or
User identifier and generate one group of air traffic control.During one group of air traffic control is generated, air traffic control system can use
The additional data from geography fence device such as environmental condition.For example, it can be based on being detected or being passed by geography fence device
One group of environmental condition sending and generate one group of air traffic control.Geography fence device can have one or more carry thereon
Sensor, the sensor can allow geography fence device to detect one or more environmental conditions.In some cases, blank pipe
System can receive data from additional data source rather than geography fence device.In some cases, air traffic control system can be from multiple
Geography fence device receives data.Air traffic control system can be from multiple data sources (such as multiple geography fence devices, geography fence dress
Put and external sensor or third party's data source) information of the reception on environmental condition.In generation for unmanned vehicle
During one group of air traffic control, any data from geography fence device or other data sources can be used.It can be based on
One or more in the following and generate one group of air traffic control:User profile, unmanned vehicle information, from geography fence
The additional data of device or the additional information from other data sources.
Unmanned vehicle can directly or can not directly to air traffic control system send communicate.In some embodiments,
Unmanned vehicle can send unmanned vehicle and/or user data to air traffic control system.Or unmanned vehicle is not to blank pipe system
System sends unmanned vehicle and/or user data.
When air traffic control system has generated one group of air traffic control for unmanned vehicle, the air traffic control system can be to institute
State unmanned vehicle and transmit one group of air traffic control.During one group of air traffic control is provided, air traffic control system can be with
Directly or indirectly communicated with unmanned vehicle.Air traffic control system can transmit one group via geography fence device to unmanned vehicle
Air traffic control.For example, air traffic control system can generate one group of air traffic control and transmit one group of flight to geography fence device
Control, the geography fence device then can send one group of air traffic control to unmanned vehicle.
Unmanned vehicle can quickly receive one group of air traffic control.Unmanned vehicle can fill entering geography fence
One group of air traffic control is received prior to, concurrently with, or after the preset range put.Unmanned vehicle can pass through geography fence
One group of air traffic control is received prior to, concurrently with, or after the geography fence border of device.In some embodiments, nobody flies
Row device can less than about 10 minutes detected by the detector of geography fence device, 5 minutes, 3 minutes, 1 minute, 30 seconds,
One group of air traffic control is received in 15 seconds, 10 seconds, 5 seconds, 3 seconds, 2 seconds, 1 second, 0.5 second or 0.1 second.Unmanned vehicle can be
Less than about 10 minutes into the preset range of geography fence device, 5 minutes, 3 minutes, 1 minute, 30 seconds, 15 seconds, 10 seconds, 5
One group of air traffic control is received in second, 3 seconds, 2 seconds, 1 second, 0.5 second or 0.1 second.
Figure 22 shows the system that geography fence device is detected according to the unmanned vehicle wherein of embodiment of the present invention.Ground
Reason fence apparatus 2210 be able to can be detected by unmanned vehicle 2220.Unmanned vehicle can have memory cell
2230th, communication unit 2232, flight controller 2234 and/or one or more sensors 2236.
Geography fence device 2210 can include indicant.The indicant of geography fence device can be can be by unmanned flight
What device 2220 detected.Indicant can be the mark that can be distinguished by one or more sensors 2236 on unmanned vehicle machine
Note.When unmanned vehicle flight, indicant be able to can be detected by unmanned vehicle.When unmanned vehicle flight,
Indicant can be detected by one or more sensors on unmanned vehicle machine.Enter in unmanned vehicle geographical
Prior to or just when in the preset range of fence apparatus, indicant be able to can be detected by the unmanned vehicle.At nobody
Aircraft enters before the geography fence border of geography fence device, and indicant can be detected by the unmanned vehicle
's.When unmanned vehicle enters the geography fence border of geography fence device, indicant can be can be by the unmanned flight
What device detected.
Indicant can be wireless signal.Geography fence device can continue broadcast wireless signal.Geography fence device can
With periodically broadcast wireless signal (for example, with rule or irregular time cycle broadcast wireless signal).For example, geography encloses
Column device can with less than or equal to about every 0.01 second once, every 0.05 second once, every 0.1 second once, every 0.5 second once, often
Second once, every 2 seconds once, every 3 seconds once, every five seconds for example once, every 10 seconds once, every 15 seconds once, every 30 seconds once, it is per minute
Once, every 3 minutes once, every 5 minutes once, every 10 minutes once or every 15 minutes cycles once come broadcast radio letter
Number.Geography fence device can be according to timetable come broadcast wireless signal.Geography fence device can be in response to event or situation
And broadcast wireless signal.For example, geography fence device can in response to the unmanned vehicle detected presence and broadcast radio
Signal.Geography fence device can be in response to detecting that unmanned vehicle has intruded the preset range of the geography fence device
Within and broadcast wireless signal.Geography fence device can in response to before unmanned vehicle has been intruded in preset range,
Detected when unmanned vehicle is just intruded in preset range or after unmanned vehicle has been intruded in preset range
The unmanned vehicle and broadcast wireless signal.Geography fence device can cross the ground of geography fence device in unmanned vehicle
Manage unmanned vehicle broadcast wireless signal described in the forward direction of fence boundary.
Indicant can provide any kind of wireless signal.For example, wireless signal can be radio signal, bluetooth letter
Number, infrared signal, UV signals, visible signal or optical signal, WiFi signal or WiMax signals or any other type it is wireless
Signal.Can be with broadcast wireless signal to allow any device in region to receive and/or detected wireless signals.In some feelings
Under condition, wireless signal can be only for unmanned vehicle.Wireless signal can be can be by the wireless receiving on unmanned vehicle machine
What device or sensor detected.In some embodiments, wireless receiver or sensor can be communication units.It can use
Same communication detects indicant and provides the communication between other devices such as unmanned vehicle and user terminal.Or
Person, it can detect indicant using different communication units and provide other dresses such as unmanned vehicle and user terminal
Communication between putting.
Indicant can be witness marking.Witness marking can be can be by one or more visual sensings of unmanned vehicle
What device detected.Witness marking can visually be depicted in by cameras capture to image on.Witness marking can include
Image.Witness marking can be static and can include the not rest image that changes over time.Rest image can
With including letter, numeral, icon, shape, symbol, picture, 1D bar codes, 2D bar codes or 3D bar codes, quick response (QR)
The image of code or any other type.Witness marking can be dynamic and can include over time changing
Image.Witness marking can continuously, periodically, according to timetable or the event in response to detecting or situation change
Become.Visual indicia may be displayed on screen, and the screen can keep static or can change and show over time
The mark shown.Visual indicia can be the paster on the surface for may be provided in geography fence device.Visual indicia can include one
Individual or multiple lamps.The space layout of lamp and/or the flash pattern of lamp may be used as a part for visual indicia.Visual indicia can be with
With color.Other provide and dynamically labeled are further described in more detail everywhere herein.Visual indicia can be regarding
It can be distinguished in feel from distant place.When unmanned vehicle enters the preset range of geography fence device, the unmanned vehicle can
Can visually distinguish the visual indicia.Before unmanned vehicle enters the preset range of geography fence device, institute
The visual indicia can visually be distinguished by stating unmanned vehicle.Enter the ground of geography fence device in unmanned vehicle
Before managing fence boundary, the unmanned vehicle can visually distinguish the visual indicia.
Indicant can be acoustic signature.Acoustic signature can send sound, vibrations or other recognizable sound effective values.Sound
Learning mark can be detected by the sonic transducer (such as microphone or other kinds of sound detector) on unmanned vehicle machine.Sound
Different tones, pitch, frequency, harmony, volume or acoustic pattern or vibrating mode can be sent by learning mark.Acoustic signature can
With or can not be and can be detected by the naked ear of the mankind.Acoustic signature may or may not be can be by typical lactation
What the ear detection of animal arrived.
Indicant can indicate that the presence of geography fence device.When unmanned vehicle detects indicant, the nothing
People's aircraft is known that geography fence device there may be.In some cases, indicant can uniquely identify geography and enclose
Column device.For example, each geography fence device can have different indicants, the indicant can be can be by unmanned flight
What device detected, the geography fence device and other geography fence devices are distinguished.In some cases, can be based on
The geography fence device of unique mark and generate one group of air traffic control.One group of air traffic control can be with the geography of the unique mark
Fence apparatus is associated.
In some cases, indicant can indicate that geography fence type of device.Indicant is without for specifically
It is unique to manage fence apparatus, but can be unique for specific geography fence type of device.In some cases, it is different
The geography fence device of type
There can be different physical characteristics (for example, model, shape, size, power output, scope, battery life, biography
Sensor, performance) or can be used for performing different geography fence functions (for example, making unmanned vehicle be maintained at outside region, shadow
The flight for ringing unmanned vehicle, the payload for influenceing unmanned vehicle operate, influence the communication of unmanned vehicle, influence nobody
The navigation of sensor, influence unmanned vehicle on aircraft machine, the electricity use for influenceing unmanned vehicle).It is different types of
Geography fence device can have different safe class or priority.For example, the rule applied by first order geography fence device
Then can be regular more important than being applied by second level geography fence device.Geography fence type of device can include by identical system
Make business or designer or the different geographical fence apparatus types created by different manufacturers or designer.In certain situation
Under, one group of air traffic control can be generated based on the geography fence type of device identified.One group of air traffic control can be with being marked
The geography fence type of device of knowledge is associated.
Indicant can be permanently affixed to geography fence device.Indicant can be integrated to geography fence device.At some
In the case of, indicant can not remove in the case where not damaging geography fence device from the geography fence device.Or instruction
Thing be able to can remove from geography fence device.Indicant can be in the case where not damaging geography fence device from described
Fence apparatus is managed to remove.In some embodiments, indicant can be the fuselage or housing of geography fence device in itself.It is geographical
The fuselage or housing of fence apparatus be able to can be identified by unmanned vehicle.For example, unmanned vehicle can include camera, institute
State camera can catch geography fence device image and can be according to the fuselage or housing of geographical fence apparatus to identify
State geography fence device.
Unmanned vehicle 2220 can sense geography fence device.Unmanned vehicle can sense geography fence device
Indicant.Unmanned vehicle can include:Sensor, it is configured for the indicant for detecting geography fence device;With
And flight control modules, it is configured for generating make the unmanned vehicle operate according to one group of air traffic control one
Or multiple signals, one group of air traffic control are the indicants based on detected, described geography fence device and generated.
A kind of method for operating unmanned vehicle can include:By means of the sensor on the unmanned vehicle machine, detection geography encloses
The indicant of column device;Make the unmanned vehicle be operated according to one group of air traffic control one is generated using flight control modules
Individual or multiple signals, one group of air traffic control are the indicants based on detected, described geography fence device and generated
's.
Unmanned vehicle can detect indicant by means of sensor 2236.Unmanned vehicle can carry a kind of or more
The sensor of type.In some cases, unmanned vehicle can detect different types of indicant.For example, nobody
Aircraft can run into the geography fence device with witness marking and another geography with wireless signal as indicant
Fence apparatus.Unmanned vehicle can detect two kinds of indicant.Or unmanned vehicle can find certain kinds
The indicant (for example, visual indicia is only identified as to the indicant of geography fence device) of type.Unmanned vehicle can carry one
Kind or polytype sensor, such as other described those sensors, and can have and can also act as everywhere herein
For the communication unit 2232 of the sensor of indicant.
When unmanned vehicle detects geography fence device, the unmanned vehicle can generate or receive one group of flight
Control.Unmanned vehicle can be operated then according to one group of air traffic control.Various types of air traffic control can be provided,
Such as other those air traffic control in greater detail everywhere herein.One group of air traffic control can include on geography fence
Border and the information of position, and the nothing for allowing or not allowing within geography fence border or outside geography fence border
The type of people aircraft manipulator.One group of air traffic control can include rule or limit applicable timing and/or want
Taken by unmanned vehicle to be responded in accordance with any flight of the control.
One group of air traffic control can be generated on unmanned vehicle machine.Unmanned vehicle can include one or more processing
Device, the processor can perform step to generate one group of air traffic control.Unmanned vehicle can include memory 2230, described
Memory can store the information available for one group of air traffic control of generation.In one example, one group of air traffic control can be with
By selecting one group of air traffic control to generate from multigroup air traffic control.Multigroup air traffic control can be stored in nobody
In memory on aircraft machine.
Unmanned vehicle can detect the presence of geography fence device.Can depositing based on the geography fence device detected
And generate one group of air traffic control.In some cases, the presence of geography fence device can be enough to generate one group of air traffic control.Can
To provide unmanned vehicle and/or user profile at unmanned vehicle.In some cases, unmanned vehicle and/or user
Information can be used for help and generate one group of air traffic control.For example, unmanned vehicle and/or user profile can be based on (for example, nothing
People's aircraft identifier, unmanned vehicle type, user identifier and/or user type) and generate one group of air traffic control.
Unmanned vehicle can receive the other information on geography fence device, such as the type of geography fence device or
The unique identifier of geography fence device.Information on geography fence device can be the indicant based on geography fence device
And determine.Or other channels can deliver the information on geography fence device.Geography fence device information can be used for
Help generates one group of air traffic control.For example, geography fence information can be based on (for example, geography fence device identification, geography enclose
Column type of device) and generate one group of air traffic control.For example, different types of geography fence device can have different borders big
Small or shape.Different types of geography fence device can have the different operating rule or limit being applied on unmanned vehicle
System.In some cases, the different geographical fence apparatus of same type can have identical boundary shape or size and/or institute
The operation rules of the same type of application.Or in identical geography fence type of device, it can also apply different
Air traffic control.
Unmanned vehicle can collect or receive the other information available for one group of air traffic control of generation.For example, nobody flies
Row device can receive the information on environmental condition.Can be from geography fence device, air traffic control system, one or more external senses
One or more sensors or any other source on device, unmanned vehicle machine receive the information on environmental condition.Can be with
One group of air traffic control is generated based on other informations such as environmental conditions.
One group of air traffic control can be generated outside unmanned vehicle machine.For example, can be in the blank pipe outside unmanned vehicle machine
One group of air traffic control is generated at system.Air traffic control system can include one or more processors, and the processor can perform step
Suddenly to generate one group of air traffic control.Air traffic control system can include memory, and the memory can be stored available for one group of generation
The information of air traffic control.In one example, one group of air traffic control can be by described in the selection from multigroup air traffic control
One group of air traffic control and generate.Multigroup air traffic control can be stored in the memory of air traffic control system.
Unmanned vehicle can detect the presence of geography fence device.In response to the detection to geographical fence apparatus,
Unmanned vehicle can send the request to one group of air traffic control to air traffic control system.Based on detected geography fence device
In the presence of one group of air traffic control can be generated at air traffic control system.In some cases, the presence of geography fence device can be enough to give birth to
Into one group of air traffic control.Unmanned flight can be provided from unmanned vehicle or from any other part of system to air traffic control system
Device and/or user profile.In some cases, unmanned vehicle and/or user profile can be used for help and generates one group of flight
Control.For example, unmanned vehicle and/or user profile can be based on (for example, unmanned vehicle identifier, unmanned vehicle class
Type, user identifier and/or user type) and generate one group of air traffic control.
Air traffic control system can receive the other information on geography fence device, the type or ground of such as geography fence device
Manage the unique identifier of fence apparatus.Air traffic control system can receive the information from unmanned vehicle, and the unmanned vehicle can
The indicant of geography fence device can be had been based on and determine described information.Or other channels can be delivered and enclosed on geography
The information of column device.For example, air traffic control system can be directly from geography fence device receive information.Air traffic control system can be by nothing
The position of people's aircraft and geography fence device is compared to determine unmanned vehicle with may have detected which (a little)
Manage fence apparatus.Geography fence device information can be used for help and generate one group of air traffic control.For example, geography fence can be based on
Information (for example, geography fence device identification, geography fence type of device) and generate one group of air traffic control.For example, inhomogeneity
The geography fence device of type can have different boundary sizes or shape.Different types of geography fence device, which can have, to be applied
Different operating rule or the limitation being added on unmanned vehicle.In some cases, the different geographical fence apparatus of same type
Can have identical boundary shape or the operation rules of size and/or the same type applied.Or even in identical
In geography fence type of device, different air traffic control can also be applied.
Air traffic control system can collect or receive the other information available for one group of air traffic control of generation.For example, air traffic control system
The information on environmental condition can be received.Can be from geography fence device, one or more external sensors, unmanned vehicle
One or more sensors or any other source on machine receive the information on environmental condition.Such as environment can be based on
The other informations such as condition and generate one group of air traffic control.
In another example, one group of air traffic control can be generated on geography fence device.Geography fence device can be with
Including one or more processors, the processor can perform step to generate one group of air traffic control.Geography fence device can
So that including memory, the memory can store the information available for one group of air traffic control of generation.In one example, it is described
One group of air traffic control can be by selecting one group of air traffic control to generate from multigroup air traffic control.Multigroup air traffic control can
To be stored in the memory of geography fence device.
Unmanned vehicle can detect the presence of geography fence device.In response to the detection to geographical fence apparatus,
Unmanned vehicle can send the request to one group of air traffic control to geography fence device.In response to from unmanned vehicle
Request, one group of air traffic control can be generated at geography fence device.Can be from unmanned vehicle or from any of system
Miscellaneous part provides unmanned vehicle and/or user profile to geography fence device.In some cases, unmanned vehicle and/
Or user profile can be used for help and generate one group of air traffic control.For example, unmanned vehicle and/or user profile can be based on
(for example, unmanned vehicle identifier, unmanned vehicle type, user identifier and/or user type) and generate one group of flight
Control.
Geography fence device can use the information on geography fence device, the type or ground of such as geography fence device
Manage the unique identifier of fence apparatus.Geography fence device can store the information on the geography fence device thereon.
Geography fence device information can be used for help and generate one group of air traffic control.For example, can be based on geography fence information (for example,
Geography fence device identification, geography fence type of device) and generate one group of air traffic control.For example, different types of geography encloses
Column device can have different boundary sizes or shape.Different types of geography fence device can fly with nobody is applied to
Different operating rule or limitation on row device.In some cases, the different geographical fence apparatus of same type can have phase
Same boundary shape or the operation rules of size and/or the same type applied.Or filled even in identical geography fence
Put in type, different air traffic control can also be applied.
Geography fence device can collect or receive the other information available for one group of air traffic control of generation.It is for example, geographical
Fence apparatus can receive the information on environmental condition.Can be from other geography fence devices, one or more external senses
One or more sensors, unmanned vehicle or any other source on device, geography fence device are received on environment
The information of condition.The other informations such as environmental condition can be based on and generate one group of air traffic control.
In some embodiments, geography fence device can include:Receiver, it, which is configured for reception, contributes to
Determine the data of one group of air traffic control;One or more processors, it is either individually or collectively configured for:Based on by institute
State the data of receiver reception and determine one group of air traffic control;And one or more transmitters, it is configured for
Transmission makes the signal that unmanned vehicle flies according to one group of air traffic control.The aspect of the present invention can be related to a kind of control
The method of the flight of unmanned vehicle, methods described include:Using the receiver of geography fence device, reception aids in determining whether one
The data of group air traffic control;By means of one or more processors, determined based on the data received as the receiver described in
One group of air traffic control;And one or more transmitters by means of the geography fence device, transmission make the unmanned flight
The signal that device flies according to one group of air traffic control.Receiver can be the input element for collecting data.Transmitter can be with
It is the output element to unmanned vehicle output signal.
In some embodiments, receiver can be sensor.The data received by receiver can be indicated
The sensing data of one or more environmental conditions of geography fence device.Geography fence device can include any kind of sensing
Device, such as vision sensor, GPS sensor, IMU sensors, magnetometer, sonic transducer, infrared sensor, sonac or
The sensor of other described any other types everywhere herein, is included in what is described in the scene carried by unmanned vehicle
Other sensors.One or more environmental conditions can include any kind of environmental condition, and such as other each places are retouched herein
Those environmental conditions stated.Sensor be able to can detect on amblent air temperature (for example, temperature, wind, precipitation, sunshine, humidity),
Environment complexity, the density of population or the magnitude of traffic flow are (for example, the surface magnitude of traffic flow or transport air flow near geography fence device
Amount) data.When generating one group of air traffic control, it may be considered that environmental condition.If for example, raining compared with not raining, fly
Row control can be with different.If the sensors sense that many movements around geography fence device are (for example, high traffic flow
Amount) and can be with different without mobile phase ratio, air traffic control.
The data received by receiver can refer to the one or more radio conditions for showing geographical fence apparatus or logical
The sensing data of creed part.For example, geography fence device can be surrounded by different wireless network or focus.When generation, one group flies
During row control, it may be considered that radio condition or communication condition.
Receiver can be arranged to the existing detector for detecting unmanned vehicle.Received by receiver
Data can indicate that the presence of unmanned vehicle.Compared to other objects that can be located in environment, the detector can energy
It is enough that the unmanned vehicle is identified as unmanned vehicle.Detector be able to can detect unmanned vehicle identity and/or nobody
Type of aircraft.In some cases, the data received by receiver can indicate that the type and/or nothing of unmanned vehicle
The identifier of people's aircraft.Detector can detect the position of unmanned vehicle.Detector can detect nobody and fly
Row device relative to the detector distance.Detector can detect side of the unmanned vehicle relative to the detector
To.Detector may be able to determine that the direction of unmanned vehicle.Detector can detect unmanned vehicle relative to described
Detector and/or the position relative to global context.
Receiver can be arranged to the communication module for receiving wireless signal.The data received by communication module
It can be user's input.User can directly into communication module hand input-data.Or user can be whole with long-distance user
End interacts, and the remote user terminals can send the signal for indicating user's input to communication module.Data can wrap
Include the information of the geographical fence apparatus around one or more.Geography fence device can communicate with each other letter and shared letter
Breath.Data can include the information of any other part from air traffic control system or Verification System.
One group of air traffic control can be determined based on the data received by receiver.One group of air traffic control can wrap
Include one or more geography fence borders for one or more flight restrictions.Can be based on the data received by receiver
And determine geography fence border.Therefore, for same geography fence device, different geography can be provided in different situations
Fence boundary.For example, when detecting the unmanned vehicle of the first kind, geography fence device can produce first group of border,
And when detecting the unmanned vehicle of Second Type, geography fence device can produce second group of border.The nothing of the first kind
The unmanned vehicle of people's aircraft and Second Type can be located in the range of geography fence device simultaneously, and can each have
There is the different boundary being applied to thereon.In another example, when environmental condition indicates that wind speed is higher, geography fence device can
To produce first group of border, and when environmental condition indicates that wind speed is relatively low, it can produce second group of border.Can be based on by
Any data (including but is not limited to unmanned vehicle information, user profile, environmental information, shared information) that receiver receives
And determine geography fence border.
One group of air traffic control can include the flight restriction of one or more types.Flight restriction goes for geography and enclosed
Area inside or outside column border.The one or more aspects that flight restriction can operate in unmanned vehicle are (for example, fly
Go, take off, landing, be payload operation, payload positioning, carrier operation, the object that can be carried by unmanned vehicle, logical
Letter, sensor, navigation and/or electricity use) on apply limitation.In some cases, can be only within geography fence border
Apply flight restriction.Or limitation can be applied only outside geography fence border.Can within border and outside all provide
Some limitations.Whole group limitation within border can be differently configured from the whole group limitation outside border.It can be based on being received by receiver
To data and determine flight restriction.Therefore, for same geography fence device, can provide in different situations different
Limitation.For example, when detecting the unmanned vehicle of the first kind, geography fence device can produce first group of flight restriction,
And when detecting the unmanned vehicle of Second Type, geography fence device can produce second group of limitation.The nothing of the first kind
The unmanned vehicle of people's aircraft and Second Type can be located in the range of geography fence device simultaneously, and can each have
There is the different one group limitation being applied to thereon.In another example, when geographical fence apparatus detects a large amount of nothings in the zone
During line focus, the geography fence device can produce first group of flight restriction, and when geographical fence apparatus is not detected by
During many hotspot, it can produce second group of air traffic control.
Geography fence device can send the signal for making unmanned vehicle be flown according to one group of air traffic control.The signal
One group of air traffic control can be included in itself.Geography fence device can be in locally one group of air traffic control of determination and then to nothing
People's aircraft sends one group of air traffic control.One group of air traffic control can be sent directly to unmanned vehicle or can be with
Unmanned vehicle can be relayed to by one group of air traffic control by sending to air traffic control system, the air traffic control system.Signal can be straight
Unmanned vehicle or another external device (ED) are delivered in sending and receiving.
In some embodiments, signal can include making external device (ED) to unmanned vehicle one group of air traffic control of transmission
Triggering.The example of external device (ED) can be another geography fence device, air traffic control system or any other external device (ED).In some feelings
Under condition, external device (ED) can store multigroup possible air traffic control or can store available for the group for generating one group of air traffic control
Into part.Geography fence device, which can be sent, can make external device (ED) generate one group of tof tube according to the determination of geographical fence apparatus
The signal of system.External device (ED) can then deliver one group of generated air traffic control to unmanned vehicle.The signal can be straight
External device (ED) is delivered in sending and receiving.
Signal can include making one group of flight determined by memory selection of the unmanned vehicle from the unmanned vehicle
The identifier of control.Unmanned vehicle can generate one group of air traffic control based on the signal from geography fence device.For example,
The part of one or more groups of air traffic control or air traffic control can be stored in the unmanned vehicle by unmanned vehicle
In memory.Geography fence device, which can be sent, can make unmanned vehicle generate one group according to the determination of geographical fence apparatus and fly
The signal of row control.In one example, the signal can include the mark that can indicate whether the generation of one group of air traffic control
Symbol.The identifier can be for the unique identifier of specific one group of air traffic control.Unmanned vehicle can be observed then
One group of air traffic control being generated and operate.
Figure 23 is shown in which the unmanned vehicle system that unmanned vehicle and geography fence device need not directly communicate with each other
The example of system.In some cases, unmanned vehicle can detect the presence of geography fence device, and or vice versa.
Unmanned vehicle system can include geography fence device 2310, unmanned vehicle 2320 and/or external device (ED)
2340.Unmanned vehicle can include memory cell 2330, sensor 2332, flight controller 2334 and/or communication unit
2336。
External device (ED) 2340 can be any other part of air traffic control system, authentication center or Verification System.External device (ED)
Can be another unmanned vehicle or another geography fence device.External device (ED) can be the other kinds of dress with being mentioned herein
Put separated device.In some cases, external device (ED) can include one or more physical units.Multiple physical units can be with
Communicate with one another.External device (ED) can possess distributed structure/architecture.In some cases, external device (ED) can have cloud computing foundation frame
Structure.External device (ED) can have P2P frameworks.External device (ED) can be communicated with unmanned vehicle 2320 and can independently with
Geography fence device 2310 communicates.
In one implementation, geography fence device 2310 can detect the presence of unmanned vehicle.Geography fence fills
Detector can be included by putting, and the detector can be located at the predetermined geographic scope of the geography fence device in unmanned vehicle
The presence of unmanned vehicle is detected when interior.Detector can be any kind of detector, and such as other are described everywhere herein
Those detectors.For example, detector can use vision sensor, radar or as other are described any everywhere herein
Other testing agencies.Detector can be configured to detect unmanned vehicle by means of one or more external device (ED)s.For example, can
So that additional sensor to be provided separately in the environment.Single sensor can detect unmanned vehicle or can help geography
The information of the detector detection unmanned vehicle of fence apparatus or collection on unmanned vehicle.For example, individually sensor can
With including the vision sensor, sonic transducer, the infrared sensor that are dispersed in the environment entirely taken by geography fence device
Or wireless receiver.Such as this paper, other are described everywhere, and detector can detect institute before unmanned vehicle enters preset range
State unmanned vehicle, or can when unmanned vehicle is located within preset range with it is very high detect it is described nobody
The possibility of aircraft.Detector can detect the unmanned flight before unmanned vehicle reaches geography fence device border
Device.
Detector can detect any information on unmanned vehicle and/or user.Detector can detect nothing
People's aircraft or user type.Detector may be able to determine that unmanned vehicle identifier and/or user identifier.In some realities
Apply in mode, detector can be communication module.The communication module can receive instruction from unmanned vehicle or external device (ED)
Go out the communication of unmanned vehicle and/or user profile.Unmanned vehicle can be received with broadcast message, described information by detector
To detect the presence of unmanned vehicle.The information broadcasted can include the information on unmanned vehicle, such as unmanned flight
The identity of device, unmanned vehicle type, the attribute of the position of unmanned vehicle or unmanned vehicle.
Geography fence device can include communication module, and the communication module may be configured for sending and trigger to nobody
Aircraft sends the signal of one group of air traffic control.When unmanned vehicle enters the predetermined geographic scope of geography fence device, lead to
Letter module can send signal.When unmanned vehicle is detected by geography fence device, communication module can send signal.
Unmanned vehicle enters before geography fence device border, and communication module can send signal.
The aspect of the present invention can include a kind of geography fence device, including:Detector, it is configured for described
The presence of unmanned vehicle is detected in the range of the predetermined geographic of geography fence device;And communication module, it is configured for
Signal, the signal triggering are sent when the unmanned vehicle enters the predetermined geographic scope of the geography fence device
One group of air traffic control is sent to the unmanned vehicle.Further aspect can be related to one kind and fly for one group to unmanned vehicle offer
The method of row control, methods described include:By means of the detector of geography fence device, in the predetermined of the geography fence device
The presence of detection unmanned vehicle in geographic range;And the communication module by means of the geography fence device, when the nothing
Transmission signal when people's aircraft enters the predetermined geographic scope of the geography fence device, the signal are triggered to the nothing
People's aircraft sends one group of air traffic control.
Signal from communication module can be sent to any device outside geography fence device.For example, signal can quilt
Send to external device (ED) 2340.As it was noted above, signal can be sent to air traffic control system, authentication center, other geography fences dress
Put or other unmanned vehicles.In some cases, signal can be sent to unmanned vehicle in itself.External device (ED) can receive
Signal and can to unmanned vehicle 2320 send one group of air traffic control.When external device (ED) reception signal, the outside dress
One group of air traffic control can be generated by putting.After one group of air traffic control has been generated, external device (ED) can be sent out to unmanned vehicle
Send one group of air traffic control.
In some alternate embodiments, communication module can provide signal to the part on geography fence device.Example
Such as, signal can be provided to the one or more processors of geography fence device, the processor can be from geography fence device
Memory in retrieve one group of air traffic control and to unmanned vehicle send described group of air traffic control.It can be filled in geography fence
Put and two-way communication is provided between unmanned vehicle.
Communication module may be configured for transmitting information within the scope of the predetermined geographic of geography fence device.Communicate mould
Block may be configured at least getting in touch with the device in the range of the predetermined geographic of geography fence device.Communication module can be with
It can be got in touch with the device outside the predetermined geographic scope of geography fence device.Communication module, which can be sent, can have limited model
The direct communication enclosed.In some cases, communication module with direct communication and can utilize one or more middle devices
Or network.
Communication module may be configured for continuous transmission information.Communication module may be configured for periodically transmitting
Information (for example, with rule or irregular interval transmission information), according to timetable transmit information or detecting event
Or information is transmitted during situation.For example, communication module can transmit information when detecting the presence of unmanned vehicle.Communication module
Information can be transmitted when detecting that unmanned vehicle is located within the preset range of geography fence device.Communication module can be
Information is transmitted when detecting unmanned vehicle close to geography fence border.Communication module can detect any situation
Information is transmitted when (such as herein other everywhere described those situations).
Geography fence device 2310 can include locator, and the locator is configured for providing geography fence device
Position.In some cases, locator can be GPS unit.Locator can provide the world coordinates of geography fence device.
Locator can determine geographical fence apparatus position using one or more sensors.Locator can provide geography fence dress
The local coordinate put.The position of geography fence device can be included in the signal of the transmission of one group of air traffic control of triggering.One
In individual example, external device (ED) can receive geography fence setting position.External device (ED) can track the geography fence dress
Put and/or region in any other geography fence device position.
In some embodiments, one group of air traffic control can be generated at external device (ED).Unmanned vehicle can be based on
And/or user profile and generate one group of air traffic control.It is, for example, possible to use unmanned vehicle identity, unmanned vehicle type, use
Family identity and/or user type generate one group of air traffic control.The information on geography fence device can be used to generate one
Group air traffic control.It is, for example, possible to use geography fence device identity, type or position.It can be based on described herein any
The information of type and one group of air traffic control is selected from multigroup air traffic control.
One group of air traffic control can include such as other described any characteristics everywhere herein.One group of air traffic control can wrap
Include geography fence border.One group of air traffic control can include one or more limitations of the operation to unmanned vehicle.
One group of air traffic control can be sent from external device (ED) to unmanned vehicle.In some cases, can be enclosed from geography
Column device sends one group of air traffic control to unmanned vehicle.Can from geography fence device directly or via external device (ED) to nobody
Aircraft sends one group of air traffic control.
In a further implementation, unmanned vehicle can receive the information of the position on geography fence device.Unmanned flight
Device can include communication unit, and it is configured for the position for receiving geography fence device;And flight control modules, its quilt
Be disposed for generation the unmanned vehicle is operated according to one group of air traffic control one or more signals, described one group
Air traffic control is the position based on the geography fence device and generated.The aspect of the present invention can operate nobody including one kind
The method of aircraft, methods described include:By means of the communication module of the unmanned vehicle, the position of reception geography fence device
Put;And by means of flight control modules, generation make one that the unmanned vehicle operates according to one group of air traffic control or
Multiple signals, one group of air traffic control are the positions based on the geography fence device and generated.
When unmanned vehicle flight, the unmanned vehicle can receive the letter of the positioning on geography fence device
Breath.Geography fence device can have the locator on the geography fence device.For example, locator can be by with
It is set to the GPS unit of the world coordinates for providing geography fence device.Can be provided on geography fence device as herein its
His described any other locator everywhere.
Unmanned vehicle can receive the positioning on geography fence device at the communication unit of the unmanned vehicle
Information.Communication unit may be configured for directly receiving the position of the geography fence device from geography fence device.It is logical
Letter unit may be configured for receiving the position of geography fence device from one or more middle devices (i.e. external device (ED)).One
Individual or multiple middle devices can be the air traffic control system outside unmanned vehicle machine.
One group of air traffic control can be generated on unmanned vehicle machine.Unmanned vehicle can will can be used for one group of generation to fly
The information storage of row control is in the machine carried memory of unmanned vehicle.For example, the machine carried memory of unmanned vehicle can store up
Deposit multigroup air traffic control.Unmanned vehicle can be flown using the received information on geography fence device with generating one group
Row control.Detection to geographical fence apparatus can trigger the generation of one group of air traffic control.The information of geography fence device can be with
Influence or can not influence the generation of one group of air traffic control.Unmanned vehicle can be then according to the one group of tof tube generated
Make and operate.
One group of air traffic control can be generated at the air traffic control system outside unmanned vehicle machine or other external device (ED)s.Outside dress
Put can by available for generation one group of air traffic control information storage in the machine carried memory of external device (ED).For example, outside dress
The machine carried memory put can store multigroup air traffic control.External device (ED) can use received on geography fence device
Information to generate one group of air traffic control.Detection to geographical fence apparatus can trigger the generation of one group of air traffic control.It is geographical
The information of fence apparatus can influence or can not influence the generation of one group of air traffic control.In some cases, can be based on
The position of geography fence device and generate one group of air traffic control.External device (ED) can send generated one group to unmanned vehicle
Air traffic control.One group of air traffic control can directly or indirectly be sent.Unmanned vehicle can have and can receive one from external device (ED)
The communication unit of group air traffic control.
The other parts of external device (ED), such as air traffic control system or Verification System, can be with Added Management unmanned vehicle and ground
Manage the interaction between fence apparatus.This paper any description goes for any kind of external device (ED).Air traffic control system can be with
From multiple unmanned vehicles and multiple geography fence device receive informations.Air traffic control system can collect the information from multiple sources simultaneously
And help to manage the flight of unmanned vehicle.Air traffic control system can push the dynamic lane information for each unmanned vehicle.
Air traffic control system can be based on receiving, refuse or change nothing on the information of other unmanned vehicles and/or geography fence device
The suggestion course line of people's aircraft.Air traffic control system the positional information of each geography fence device can be used to receive, to refuse or
Change the suggestion course line of unmanned vehicle.Air traffic control system can provide navigation Service.Air traffic control system can help unmanned vehicle
Navigate in the environment.Air traffic control system can help unmanned vehicle wherein can the ring with one or more geography fence devices
Navigated in border.
Figure 41 shows the air traffic control system wherein and multiple unmanned vehicles and multiple geography according to embodiment of the present invention
The example for the unmanned vehicle system that fence apparatus interacts.Air traffic control system 4110 can fill with one or more geography fences
4120a, 4120b, 4120c, 4120d is put to communicate.Air traffic control system can with one or more unmanned vehicle 4130a,
4130b, 4130c, 4130d are communicated.
In some embodiments, air traffic control system could be aware that the position of geography fence device.Geography fence device can be with
With the locator that can determine that the geography fence setting position.Information from locator can be transferred into air traffic control system.Such as
The position of fruit geography fence device changes, then it can be updated.
Air traffic control system could be aware that the position of unmanned vehicle.Unmanned vehicle, which can have, determines unmanned vehicle position
Locator.For example, unmanned vehicle can have GPS unit or can determine unmanned vehicle using other sensors
Position.Information on unmanned vehicle position can be transferred into air traffic control system.If the position of unmanned vehicle changes,
It can be updated.
Air traffic control system is known that the position of geography fence device and unmanned vehicle.Can be in real time or with high-frequency
Ground-to-ground manage fence apparatus and the position of unmanned vehicle is positioned.Air traffic control system can be collected advantageously from multiple geography
The information of fence apparatus and multiple unmanned vehicles.Therefore, air traffic control system be able to can have good to the device in region
Understand.Air traffic control system is known that the position of geography fence device and unmanned vehicle, and nothing is detected without geography fence device
Or vice versa for people's aircraft.In some cases, the detection between geography fence device and unmanned vehicle can occur.
Air traffic control system can detect the preset range whether unmanned vehicle is going into geography fence device.Air traffic control system can be with
Unmanned vehicle can be detected whether close to the geography fence border of geographical fence apparatus.Air traffic control system be able to can alert
Unmanned vehicle and/or geography fence device:The unmanned vehicle is close to the geography fence device.Or can be with
Warning is not provided.
When air traffic control system detects unmanned vehicle close to geographical fence apparatus, the air traffic control system can generate
One group of air traffic control for the unmanned vehicle and transmit one group of air traffic control to the unmanned vehicle.Blank pipe
System can be detected by comparing the position data of unmanned vehicle and the position data of geography fence device it is described nobody
Aircraft is close to the geography fence device.The real time position of unmanned vehicle can be with the real-time position of geography fence device
Put and be compared.The coordinate of unmanned vehicle can be compared with the coordinate of geography fence device.Unmanned flight can be compared
The position of device and geography fence device, without detecting unmanned vehicle by geography fence device, or vice versa.Described one
Group air traffic control can be customized for the close geography fence device of unmanned vehicle, or based on described device and
Generation.Unmanned vehicle can receive one group of air traffic control and be operated according to described group of air traffic control.
In alternative realizations, can detect the unmanned vehicle of geographical fence apparatus can provide unmanned flight to air traffic control system
Device is close to the instruction of geographical fence apparatus.Air traffic control system can generate for unmanned vehicle one group of air traffic control and
One group of air traffic control is transmitted to unmanned vehicle.Geography fence device may be provided on the opening position to be detected but without tool
There are other functions.In some cases, geography fence device may be provided on the opening position and can be identified uniquely
Either can there can be certain influence to the type of the air traffic control generated by type identification, the type.It is geographical
Fence apparatus itself need not perform any action.Or geography fence device can detect unmanned vehicle close to simultaneously
And unmanned vehicle can be provided to air traffic control system close to the instruction of geographical fence apparatus.Air traffic control system can be generated and is directed to
One group of air traffic control of unmanned vehicle and transmit one group of air traffic control to unmanned vehicle.Geography fence device can quilt
There is provided in the opening position but need not have other functions to be detected by unmanned vehicle.In some cases, geography fence device
Can have unique identifier or can be by type identification, air traffic control that the type can be to being generated
Type there is certain influence.Geography fence device itself need not perform any additional move.Therefore, in some implementations, ground
Reason fence apparatus can be advantageously relatively simple or has cost-benefit device.
In further alternative realizations, air traffic control system provides to unmanned vehicle can make the unmanned vehicle generate one group
The signal of air traffic control, rather than one group of air traffic control is generated on air traffic control system.Signal from air traffic control system can be true
Surely any group air traffic control generated.Signal from air traffic control system can correspond to one group of single air traffic control.When nobody flies
When row device generates one group of air traffic control, the unmanned vehicle can be acted then according to one group of air traffic control.Another
In one example, air traffic control system can provide to geography fence device can make one group of air traffic control of the geography fence device generation
Signal, rather than one group of air traffic control is generated on air traffic control system.Signal from air traffic control system can determine which to be generated
Group air traffic control.Signal from air traffic control system can correspond to one group of single air traffic control.Geography fence device can be to
Unmanned vehicle transmits one group of generated air traffic control.When unmanned vehicle receives one group of air traffic control, described nobody flies
Row device can be acted then according to one group of air traffic control.Similarly, air traffic control system can be to the attached of any other type
Feeder apparatus provides the signal that the attachment device can be made to generate one group of air traffic control.Attachment device can transmit to unmanned vehicle
The one group of air traffic control generated, the unmanned vehicle can operate according to one group of air traffic control.
As it was noted above, various types of interactions between the part of unmanned vehicle system can allow to generate tof tube
Make and allow unmanned vehicle to observe the air traffic control and operate.Air traffic control can be on the side by geography fence device
The fixed one or more area of boundary.In some cases, such as unmanned vehicle, user terminal (for example, remote control), geography
The all parts such as fence apparatus, external memory unit and/or air traffic control system (or other external device (ED)s) can communicate with one another or
Can be by detecting each other.
In some embodiments, push communication can be provided between any two in the part.Push communication
It can include sending to the communication of second component, wherein first component from first component and initiate the communication.Communication can be from the
One part is sent to second component, and to the no any request of the communication from second component.For example, air traffic control system can be downward
Push is communicated to unmanned vehicle.Air traffic control system can be in the case where unmanned vehicle ask one group of air traffic control to described
Unmanned vehicle sends one group of air traffic control.
Communication is pulled it is alternatively possible to be provided between any two part.Pulling communication can be included from first component
Send to the communication of second component, wherein second component and initiate the communication.Communication can be in response to from second component
The request of communication and sent from first component to second component.For example, when unmanned vehicle asks one group of air traffic control of renewal,
Air traffic control system can send one group of air traffic control to the unmanned vehicle.
Communication between any two part can be automatic.Communication can without from user any instruction or
Occur in the case of input.Communication can occur automatically in response to timetable or the event detected or situation.One or more
Individual processor can receive data and the instruction for communication can be automatically generated based on the data received.It is for example, empty
Guard system can send the renewal to local navigation map from trend unmanned vehicle.
One or more communications between any two part can be manual.Communication can come from user detecting
Instruction or input when occur.User can initiate the communication.User can control the one or more aspects of communication, such as
Inside perhaps deliver.For example, user can renewal of the order unmanned vehicle from air traffic control system request to local navigation map.
Communication can be occurred with real-time continuous, can be occurred according to routine (for example, with rule or irregular time interval
Periodically occur, either occurred according to timetable) or occurred in a manner of non-routine (for example, in response to the event detected
Or situation and occur).First component can be sent by continuous fashion, according to routine or in a manner of non-routine to second component
Communication.For example, geography fence device can continue to send the information on its position to air traffic control system.Air traffic control system can be real-time
Know the position of geography fence device.Or geography fence device can be sent in a manner of routine and be filled on the geography fence
The information of seated position.For example, geography fence device can on its position renewal air traffic control system per minute.In another example
In, geography fence device can send its position according to timetable to air traffic control system.The timetable can be updated.For example,
On Monday, geography fence device can be with renewal of the transmission on its position per minute, and can be with every in Tuesday, geography fence device
The renewal sent on its position in 5 minutes.In another example, geography fence device can be sent in a manner of non-routine on
The information of the geography fence setting position.For example, geography fence device can detect unmanned vehicle just in described device
When close to described device the information on the geography fence setting position is sent to air traffic control system.
Communication between any two part can be direct or indirect.Can be from first component directly to second
Part provides communication, without any intermediate.For example, remote control can be straight by the receiver of unmanned vehicle from transmitter transmission
The radio signal of reception.It can be led to by then being provided indirectly to second component from first component in being carried out via intermediate
Letter.Intermediate can be one or more middle device or network.For example, remote control can send signal by communication network
To control the operation of unmanned vehicle, it can include the route via one or more antenna towers.In another example, fly
Control information can be sent directly to unmanned vehicle and then be received and sent by user terminal (for example, via unmanned flight
Device), or user terminal can be sent directly to and then received and sent by unmanned vehicle (for example, whole via user
End).
Any kind of communication between any part can in a variety of ways (all those modes as described herein)
There is provided.Communication can include positional information, identification information, the information for certification, the information on environmental condition or with fly
The relevant information of row control.For example, one or more groups of air traffic control can be provided via communication, the communication can be push
Or pull communication, automatic or manual communication, the communication that real-time continuous occurs, the communication occurred according to routine or the side with non-routine
The communication that formula occurs, or the communication that can directly or indirectly occur.
The control that geography fence device determines
Geography fence device can have border.Border can limit the area that one group of air traffic control can be applicable.It is described
Area can be located within geography fence border.The area can be located at outside geography fence border.Can be at described one group
The border is determined in the generation of air traffic control.The border can be determined independently of remaining group air traffic control is generated.
In some embodiments, geography fence device can generate one group of air traffic control.Generated by geography fence device
One group of air traffic control can also include instruction to the border of geographical fence apparatus.Or geography fence device can determine
For the border of geography fence device, and one group of air traffic control or the life of another different device are generated with the geography fence device
It is unrelated into one group of air traffic control.
Or air traffic control system can generate one group of air traffic control.By air traffic control system generation one group of air traffic control also
The instruction to the border of geographical fence apparatus can be included.Or air traffic control system can determine the side for geography fence device
Boundary, and it is unrelated to generate one group of air traffic control with the air traffic control system one group of air traffic control of generation or another different device.Herein
Pair determine that any description of the geography fence device on the border of air traffic control or geography fence device is readily applicable to determine to fly
The air traffic control system on the border of row control or geography fence device.
In further example, unmanned vehicle can generate one group of air traffic control.By one group of unmanned vehicle generation
Air traffic control can also include the instruction to the border of geographical fence apparatus.Or unmanned vehicle can be determined for geography
The border of fence apparatus, and generate one group of air traffic control or the one group of air traffic control of generation of another different device with unmanned vehicle
It is unrelated.Any description of the geography fence device on the border of pair determination air traffic control or geography fence device can also be applied herein
In it is determined that the unmanned vehicle on the border of air traffic control or geography fence device.
Geography fence device can voluntarily determine to be applicable to one group of air traffic control of geography fence device and/or described
Manage the border of fence apparatus.One group of air traffic control (and/or border) can be based on the information from air-traffic control system, use
Family input, ambient information (for example, amblent air temperature, environment complexity, the density of population, magnitude of traffic flow), air route state (example
Such as, air traffic state), from the information of geographical fence apparatus around and/or from it is one or more nobody fly
The information of row device.Can in response to described any factor or the information from described any source and change or update
Any air traffic control.Renewal or change can be carried out in real time, can be periodically (for example, between rule or irregular time
Every), carried out according to timetable or the event in response to detecting or situation.
Limit Type
As it was noted above, operation that can be to unmanned vehicle applies any kind of air traffic control.Can be in response to ground
Manage the presence of fence apparatus and apply any kind of air traffic control as previously described.Geography fence device can have can be with
The one or more geography fence borders associated with one group of air traffic control.
One group of air traffic control can include the limitation of the behavior to unmanned vehicle.For example, unmanned vehicle can be limited
Into the area limited by geography fence device.Other examples of limitation can include but is not limited to limitation and exist, allow to exist,
Height limitation, linear speed limitation, angular speed limitation, linear acceleration limitation, angular acceleration limitation, effectively time restriction, load
Lotus using limit, limitation of taking photo by plane, the limitation to sensor operations is (for example, beat opening/closing particular sensor, without using sensor
Collect data, do not record the data from sensor, do not transmit the data from sensor), transmitting limitation (for example, specify
Sent in electromagnetic spectrum, the specified electromagnetic spectrum can include visible ray, infrared ray or ultraviolet, the limit to sound or vibrations
System), limitation to unmanned vehicle outward appearance change (for example, limitation to unmanned vehicle deformation), the limitation to wireless signal
(for example, frequency band, frequency, agreement), to it is used communication or communication in change limitation, to what is carried by unmanned vehicle
The limitation (for example, type of items, Item Weight, item sizes, article material) of article, on article or to utilize article
The limitation (for example, article is left behind or delivered, article is picked up) of the action of execution, to the limiting of unmanned vehicle carrier operation, right
Electricity uses or the limitation of management (such as, it is desirable to enough remaining battery capacities), to the limitation of landing, to the limitation taken off or
Any other limitation used of person to unmanned vehicle.In other any examples provided everywhere on air traffic control herein
Unmanned vehicle can be applied to as possible limitation, the limitation is associated with the presence of geography fence device.
Geography fence device can have different type.In some cases, different types of geography fence device can be with
Apply different types of flight restriction.The example of flight restriction type can include any of above flight restriction or herein other
Described any air traffic control everywhere.In some cases, the different types of geographical fence apparatus of difference can have relative
In the different boundary (for example, different shapes, size, change condition) of the geography fence device.
As it was noted above, unmanned vehicle identity, user identity and/or geography fence device entity can be based on and applied
Different limitations.For different unmanned vehicle types, different user types and/or different geography fence device classes
Type, different limitations can be applied.For the unmanned vehicle with different operating grade, the user with different operating grade
And/or the geography fence device with different operating grade, different limitations can be provided.
When unmanned vehicle does not comply with one group of air traffic control and acted, flight responsive measures can occur.Can from
Family adapter control unmanned vehicle.Control can be by performing flight responsive measures automatically according to the instruction on unmanned vehicle machine
Unmanned vehicle itself adapter, by send instruction so that unmanned vehicle performs flight according to the instruction on air traffic control system
The air traffic control system adapter of responsive measures, or by another user with the operation grade higher than unmanned vehicle original user
Adapter.Instruction can be provided from the source away from unmanned vehicle, the source has the privilege higher than the privilege of original user.Can
To make the report of adapter to air traffic control system.Unmanned vehicle can formulate flight responsive measures.Can be according to unmanned vehicle
Inobservant flight restriction and flight responsive measures are provided.
If do not allowed in its existing area for example, unmanned vehicle is located at, the unmanned vehicle can be forced
The area is left, starting point is back to or goes home a little or land.Adapter occur before, can give unmanned vehicle some
Time makes the unmanned vehicle leave the area so as to user.If unmanned vehicle, which leaves, allows the unmanned vehicle
Unique area of flight, then the unmanned vehicle can be forced to be back to the area or landing., can before adapter controls
To give some times of unmanned vehicle so that user makes the unmanned vehicle be back to the area.If unmanned vehicle
Do not allowing to operate payload in the area of unmanned vehicle operation payload, then can close automatically described has
Imitate load.If unmanned vehicle does not allow the collection of information using sensor collection information in area, can close
The sensor is closed, the sensor, which can not record the data collected or the sensor, can not transmit it
The data collected.In another example, if not allowing radio communication in area, the logical of unmanned vehicle can be closed
Unit is believed to prevent radio communication.If not allowing unmanned vehicle to drop in area, user provides landing instruction,
The unmanned vehicle can not land but hover.If unmanned vehicle must maintain certain battery charge level in area
And charge level is down to below aspiration level, then the unmanned vehicle can be to be automatically guided to Battery Charging Station, Ke Yi
Regional outer navigation can be forced to land.In any case, some times of user can be given to observe, or, flight
Responsive measures can come into force.Can provide can allow unmanned vehicle observe its unsatisfied air traffic control any other
The flight responsive measures of type.
In some cases, geography fence device can be used for limiting flight restricted area, one of which or multigroup tof tube
System can be applicable.Geography fence border can be the circumference of flight restricted area.In some cases, for the spy in particular task
Determine unmanned vehicle, same group of flight restriction goes in flight restricted area or outside flight restricted area.
Alternatively, geography fence device can be used for limiting multiple flight restricted areas.Figure 24 shows can there is multiple flights
The example of the geography fence device of restricted area.Geography fence device 2410 can be used for limiting the first flight restricted area (for example, area
A 2420a) and the second flight restricted area (for example, area B 2420b).It is alternatively possible to provide the 3rd flight restricted area (for example,
Area C 2420c).Any number of flight restricted area can be limited by geography fence device.For example, can be by geography fence device
Limit it is one or more, two or more, three or more, four or more, five or more, six or more
It is individual, seven or more, eight or more, nine or more, ten or more, it is ten one or more, 12
Or more, 15 or more, 20 or more, 25 or more, 30 or more, 50 or more or
100 or more flight restricted areas.
The area can be with overlapping or can not be overlapping.In one case, area A, area B and area C can be separated, no
Overlapping area.For example, area A can have circle.Area B can be annular (for example, can within area B external boundary and
Outside area A external boundary).Area C can be have perforate hole rectangle (for example, can within area C external boundary and
Outside area B external boundary).The external boundary in area can be concentric, to cause border to mutually disjoint.Or the outside in area
Boundary can intersect each other.In some cases, area can be with overlapping.In some cases, an area can be fully located at another area
It is interior.Such as area A can be round.Area B can not have porose circle.Area A can be fully located in area B.In some cases, if
One area is located in another area, then inner region can have the institute of outskirt restricted.
Area can have any size or shape.Area can be by two-dimentional borders.In two-dimentional border above and below
Space can be the part in the area.For example, area can have rounded, oval, triangle, square, rectangle, any
Quadrangle, bar shaped, pentagon, hexagon, octagon, crescent, annular, star or any other rule or irregular shape
The two-dimentional border of shape.The shape may or may not include one or more holes in wherein.Area can be by three-dimensional side
Boundary is determined.The space being enclosed in three-dimensional boundaries can be the part in the area.For example, area can have it is spherical, cylindrical,
Prismatic (cross section with any shape), hemispherical, bowl-type, annular, bell, wall shape, cone or any rule
Then or irregular shape.The not same district limited by geography fence can be of similar shape or can have different shapes
Shape.The not same district limited by geography fence device can have different sizes.
In some cases, geography fence device can be located within the external boundary in all areas.Or geography fence device
It can be located at outside the external boundary in one or more areas.The area can be all spaced apart and non-intersect.However, it is possible to reference to
Geography fence device positions all areas of geographical fence apparatus.It is geographical if geography fence device will move in environment
The area of fence apparatus can move together with described device.For example, if about 10 meters of the movement eastwards of geography fence device, described
The area of geography fence device can correspondingly move 10 meters eastwards.In some embodiments, area can be radial symmetric.Nothing
How to be rotated by geography fence device, area can keep constant.Or area can not be radial symmetric.If for example, rotation
Geography fence device, then the area can correspondingly rotate.Area can rotate around geography fence device.It is if for example, geographical
Fence apparatus dextrorotation is turn 90 degrees, then the area can be turn 90 degrees around some dextrorotations at geography fence device.
Under certain situation, geography fence device rotation can not the zone of influence position.
In some cases, each flight restricted area can have the limitation of its own.One group of air traffic control can with not
Same flight restricted area border and corresponding limitation are associated.For example, one group of air traffic control can include the border for area A,
Border for area B, the border for area C, the limitation for area A, the limitation for area B and/or the limit for area C
System.Different areas can have different limitations.In one example, area A can limit flight to cause no unmanned flight
Device can enter area A.Area B can allow to fly but unmanned vehicle may be prevented to operate camera in area B.Area C can allow
Flight and camera are used, but unmanned vehicle may not be allowed to be flown below height lower limit.Can be in one group of air traffic control
Instruction for these different control is provided.Different areas can have limitation to the different aspect that unmanned vehicle operates.No
Same area can have limitation to the same one side that unmanned vehicle operates, but limit levels are different.For example, area A, area B
The flight of unmanned vehicle can be limited with area C.However, in different areas, it can differently limit nobody and fly
The flight of row device.For example, in area A, unmanned vehicle can not allowed to enter.In area B, unmanned vehicle is possible must
It must be flown more than height lower limit, wherein the height of height lower limit increases as the distance away from area A increases.In area C, nobody
Aircraft cannot fly being positively retained at below the height lower limit of substantial horizontal height, and wherein area C height lower limit and area B is high
The peak of degree lower limit matches.
Similarly, each area can have the one group of border of its own, and the border can be identical with the border in other areas
It is or different.Every group of border can correspond to one group of different air traffic control.Every group of border can correspond to one group of different flight
Limitation.In some cases, the type for the flight restriction on every group of border can be identical.Or for every group of border
The type of flight restriction can be different.
In some embodiments, there can be most stringent of limitation near the area of geography fence device.In some realities
Apply in mode, can be than having tightened up limitation further from the area of geographical fence apparatus closer to the area of geography fence device.
Can be than there is less or less stringent limitation closer to the area of geography fence device further from the area of geographical fence apparatus.
For example, in area A, unmanned vehicle can not be allowed to enter.In area B, unmanned vehicle can be allowed under the first height
More than limit fly.In area C, unmanned vehicle can be allowed to fly more than the second height lower limit less than the first height lower limit
OK.In some embodiments, go for enclosing closer to geography further from the institute in the area of geographical fence apparatus is restricted
All areas of column device.Therefore, there can be additional, to other areas limitations closer to the area of geography fence device.For example,
Area C can have one group of limitation.Area B can add additional area B limitation with all area C limitation.Area A can have institute
There are area C limitation, area B additional limitation and the additional limitation from area A.For example, area C can allow unmanned vehicle in area
From anywhere in fly and operate payload but do not land, area B can not also allow unmanned vehicle to land, but be also possible to hinder
Payload is only operated on unmanned vehicle, but still allows unmanned vehicle to be flown at any point, and area A can not permit
Perhaps unmanned vehicle lands, and can prevent the operation of payload, and can require unmanned vehicle more than height lower limit
Flight.
In other embodiments, area can have limitation independently from each other.Closer to the area of geography fence device without
Need to be more restricted than other areas higher.For example, area A can prevent unmanned vehicle operation payload but can allow unmanned flight
Anywhere device flies, area B can allow unmanned vehicle operation payload but can prevent unmanned vehicle in height
More than the upper limit fly, and area C can prevent the radio communication from unmanned vehicle, and unmanned vehicle can it is in office where
Fang Feihang and operate payload.
Unmanned vehicle navigates
One or more unmanned vehicles can navigate in area.Unmanned vehicle can advance along flight path.
Flight path can be predetermined, half predetermined or can create in real time.
For example, whole flight path can be predetermined.Each position along flight path can be predetermined.One
In the case of a little, flight path can include unmanned vehicle the position in area.In some cases, flight path can be with
Including unmanned vehicle the opening position direction.In one example, predetermined flight path can predetermined unmanned vehicle
Position and orientation.Or only the position of unmanned vehicle can be predetermined, and the direction of unmanned vehicle can not be
It is predetermined and can be variable.Other functions of unmanned vehicle can as the part of predetermined flight path but it is pre-
Fixed, or can not be predetermined.For example, payload use can as the part of flight path but it is predetermined.
For example, unmanned vehicle can carry image capture device.Open or close position, the image capture device of image capture device
Can be predetermined in the zoom of each opening position along path, pattern or other operating characteristicses.In some cases, image
Trap setting relative to unmanned vehicle positioning (for example, direction) can also as the part of flight path but it is predetermined
's.For example, image capture device can have the first direction relative to the unmanned vehicle at first position, and it is then relative
Unmanned vehicle in the second place can switch to the second direction.In another example, radio communication can be used as flight
The part in path but it is predetermined.For example, can predetermined unmanned vehicle will use certain at the Part I of flight path
One communication frequency simultaneously then switches to another different communication frequency at the Part II of flight path.Unmanned vehicle it is any
Other operating functions can as the part of predetermined flight path but it is predetermined.In some embodiments, not as winged
The aspect of the part in walking along the street footpath and the operation of predetermined unmanned vehicle can be variable.When unmanned vehicle traversal flight road
During footpath, user can provide the input of one or more alterable features of controllable unmanned vehicle operation.User can be with
It or can not change the predetermined portions of predetermined flight path.
In another example, flight path can be half predetermined.Can be directed to flight path and provide some parts or
Checkpoint, the part or checkpoint can be predetermined.Unscheduled part can be variable and/or can be by user's control
's.For example, flight path can be directed to and make a reservation for a series of way points.Unmanned vehicle flight path between way point can be with
It is variable.However, even if the path between way point can change, unmanned vehicle also can be guided to each way point.
In some cases, final destination can be predetermined.Reach final destination whole path can be it is variable and/or
Can be by user's control.
In another example, can Make Path in real time.Whole flight can be by user's control.User can not appoint
When control unmanned vehicle manually in the case of journey or predefined paths or target.User can freely manipulate nobody in environment
Aircraft.When unmanned vehicle travels through environment, the flight path of the unmanned vehicle can be created.
Geography fence device in area can influence the flight path of unmanned vehicle.In some cases, in environment
Geography fence device can be considered and one or more groups of tof tubes can be applied to the unmanned vehicle that is operated in environment
System.Unmanned vehicle behavior can by or can not be changed by geography fence device.If the action of unmanned vehicle is not abided by
One group of air traffic control is kept, then can change unmanned vehicle behavior.If one group of air traffic control is observed in the action of unmanned vehicle,
Unmanned vehicle behavior then alternatively can not be changed.When unmanned vehicle is traveling through predetermined flight path, half predetermined flight
When path or real-time flight path, it may be considered that geography fence device.
Figure 42 is shown with unmanned vehicle that can be just in the domestic flight path of traversal ring and one or more ground
Manage the example of the environment of fence apparatus.One or more unmanned vehicles are (for example, unmanned vehicle A 4210a, unmanned vehicle
B 4210b) environment can be traveled through along flight path.Flight path (for example, path A, path B, path C) can be predetermined
, can be half predetermined or can determine in real time.Unmanned vehicle can alternatively fly to destination 4220.Destination
It can be intended destination or can be the destination determined in real time.Destination can be last final destination or can
To be the way point along path.Destination can be it is any can be unmanned vehicle target position.Can be in environment
One or more geography fence devices are provided (for example, GF1 4230a, GF2 4230b, GF3 4230c, GF4 4230d or GF5
4230e).Geography fence device can have geography fence device border.
Unmanned vehicle can be grasped according to one group of air traffic control that can be associated with one or more geography fence devices
Make.Such as this paper, other are described everywhere, and any interact can be provided between unmanned vehicle and geography fence device.As herein its
He is described everywhere, can be in air traffic control system (or other external device (ED)s or system) and unmanned vehicle and/or geography fence device
Between any interaction is provided.The interaction can cause the generation of one group of air traffic control, and described group of air traffic control may be provided to
Unmanned vehicle generates on unmanned vehicle machine.Described group of air traffic control can include being filled by the geography fence in area
Put one or more limitations of application.
In one example, unmanned vehicle 4210a can advance towards destination 4220.Can unmanned vehicle with
One or more geography fence device 4230a, 4230b are provided between destination.Geography fence device can have to fall in nothing
Border between people's aircraft and destination.In some cases, geography fence device border can hinder unmanned vehicle court
To the path of its destination.Unmanned vehicle can alternatively have flight path.In some cases, if unmanned vehicle
The flight path is continued on, then unmanned vehicle can run into the side of geography fence device in the way for lead to destination
Boundary.Track can allow unmanned vehicle along predetermined flight path, half predetermined flight path or real-time flight path.
In one example, the flight path of original plan can be with the confined area phase in the border of geography fence device
Hand over.If it is the case, then path can be changed to that geography fence device can be avoided and unmanned vehicle is maintained at limited
Another path (for example, path A) outside region.Path A can be calculated so that unmanned vehicle is avoiding the same of confined area
When arrive at.In some cases, path A can be selected so that unmanned vehicle with predefined paths relatively small amount
Deviation in the case of arrive at.Possible minimum bias can be calculated.Or bias can be in possible minimum
Bias 50% or smaller, 40% or smaller, 30% or smaller, 20% or smaller, 10% or smaller, 5% or smaller or
Within 1% or smaller.For example, it may be determined that GF1 and GF2 border overlays, to allow unmanned vehicle not enclosed by geography
Between column device.Unmanned vehicle can select the path for taking on GF2 sides or GF1 sides.GF2 paths can with it is shorter or with
Original path deviates less.Therefore, path A can be selected as surrounding GF2 sides.In some cases, can select to consider ring
The path A of border condition.If wind strongly blows, unmanned vehicle can take wider path to avoid border, so as to
The bigger guarantee that unmanned vehicle can not be blown in confined area unintentionally is provided.It is contemplated that other are measured, such as energy
Efficiency.Unmanned vehicle can be guided to the path with of a relatively high energy efficiency levels.Therefore can be in unmanned flight
Predefined paths are changed during device flight to avoid geography fence device.
In other cases, predefined paths can be calculated or generate to avoid geography fence device in advance.For example, user can
To enter proposed path, way point or destination.It is special that user can indicate that the user wishes that unmanned vehicle reaches
Fixed destination (it can be way point).Herein other described air traffic control system or any other system can be collected everywhere
Data on the geography fence device in region.Air traffic control system can detect the position and/or border of geography fence device.With
Family can alternatively suggest the flight path arrived at.Air traffic control system can receive, refuse or change the path.One
In the case of a little, air traffic control system can suggest the path that unmanned vehicle can be allowed to be arrived at while confined area is avoided
(for example, path A).Proposed path can be selected to have the deviation in the path being initially recommended with user of relatively small amount.
User can select to receive or refuse proposed path.Or the suggestion path from air traffic control system can be implemented automatically.Cause
This, the predetermined flight path of unmanned vehicle can already have accounted for geography fence device and depict to enclose by each geography
Column device is so that the path that unmanned vehicle arrives at.In some embodiments, user need not suggest whole path but
One or more destinations can be suggested.Air traffic control system, which can contemplate geography fence device information and can generate, allows nobody
The predetermined flight path that aircraft is arrived at without entering confined area.In some cases, it may be considered that avoid limited
Multiple possible paths in region and single-pathway can be selected from the multiple path.
In another example, half predetermined flight path can make unmanned vehicle be located at in geography fence device border
On the intersecting track of confined area.For example, it can be advanced into destination and unmanned vehicle towards the destination.
If it is the case, then path can be changed to that geography fence device can be avoided and unmanned vehicle is maintained at confined area
Outside another path (for example, path A).Path A can be calculated so that unmanned vehicle arrives while confined area is avoided
Up to destination.In some cases, path A can be selected so that unmanned vehicle is based on pre-track and with relatively small
Bias in the case of arrive at.The new route in view of environmental condition or other conditions can be selected.Therefore can be with
Half predetermined path is changed in unmanned vehicle flight to avoid geography fence device, but still allows unmanned vehicle to reach mesh
Ground.
In some cases, half predetermined path can be calculated or generate to avoid geography fence device in advance.For example, with
Family can enter proposed destination (for example, final destination, way point).Other described air traffic control systems everywhere herein
Or any other system can collect the data on geography fence device in region.Air traffic control system can detect geography fence dress
The position and/or border put.Air traffic control system can determine proposed destination whether in confined area, the restricted area
Domain can be located in the border of geography fence device.If destination is not in confined area, then proposed by can receiving
Destination.If destination is located in the confined area that would not allow for unmanned vehicle to enter, then air traffic control system can be refused
The exhausted destination.In some cases, air traffic control system can suggest being located at outside confined area but close to original destination institute
Another object at place.During new suggestion destination is generated, it may be considered that one or more factors, such as away from most
The distance of the destination just suggested, flight path close to new destination easiness or environmental condition.
In addition, user can control unmanned vehicle manually in real time.Unmanned vehicle, which can have, can indicate that nobody
The track that aircraft will enter in the confined area in geography fence device border.If it is the case, then path can be with
It is changed to that geography fence device can be avoided and makes another path that unmanned vehicle is maintained at outside confined area (for example, path
A).In some cases, it can issue the user with to the user close to the warning on border, and alternatively give described
Some times of user are voluntarily corrected.If user does not correct voluntarily within the time distributed, can be connect from the user
Management and control system.Or path can be changed automatically in the case where not giving user time voluntarily to correct.Adapter can make nobody
Aircraft flies along the path (for example, path A) after change.Path A can be calculated so that unmanned vehicle is limited in avoidance
The destination of planning is reached while region.When formulating path A, it may be considered that one or more factors, such as with original rail
Deviation, energy efficiency or the environmental condition of mark.Therefore, when unmanned vehicle flight, real-time route can be changed to avoid ground
Manage fence apparatus.
In some embodiments, Local Navigation map can be provided for unmanned vehicle.Unmanned vehicle can be from sky
Guard system or other external device (ED)s receive local navigation map.Unmanned vehicle can receive Local Navigation from geography fence device
Map.Local Navigation map can include the position of one or more geography fence devices.Local Navigation map can include one
The border of individual or multiple geography fence devices.Local Navigation map can include on can be applied to it is each area in nobody fly
The information of limitation on row device.For example, if unmanned vehicle is not allowed to be flown in the border of geography fence device, locally
Map can indicate the limitation to being flown in area on map.In another example, unmanned vehicle is not allowed another
Payload is operated in the border of geography fence device, local map can indicate on map and payload in area is grasped
The limitation of work.One or more groups of air traffic control for unmanned vehicle can be reflected in Local Navigation map.
Unmanned vehicle can be navigated using Local Navigation map in area.In some cases, Local Navigation
Figure can include the predefined paths for being drawn on unmanned vehicle therein.Predefined paths can already have accounted for geography fence dress
Put.Unmanned vehicle can then follow predefined paths., if necessary can be with if unmanned vehicle deviates predefined paths
Make adjustment.Unmanned vehicle current location can should be compared with whereabouts on map with unmanned vehicle.If
Predefined paths do not consider geography fence device and are seen into confined area, then can update predefined paths, and can be with
Cartographic information is updated to reflect described information.
In some embodiments, Local Navigation map can include for unmanned vehicle, as half predefined paths
A part one or more destinations.The destination can include the way point for unmanned vehicle.The purpose
Ground can already have accounted for geography fence device.For example, destination can be selected at the opening position not in confined area.Nothing
People's aircraft be able to can advance between destination and destination.It is necessary if encountering one or more confined areas
When can make adjustment.If destination does not consider geography fence device and one or more destinations are located at confined area
Region that is interior, then destination being updated to outside limited area, and cartographic information can be updated to reflect described information.
Or unmanned vehicle can be operated along real-time route.Local Navigation map can track nobody and fly
Row device relative to one or more geography fence devices position.If see unmanned vehicle close to flight restricted area
Domain, then it can make adjustment if necessary to change unmanned vehicle path.
In some cases, when unmanned vehicle travels through environment, Local Navigation map can be updated to reflect on institute
State the information of the environment near unmanned vehicle.For example, when new portion of the unmanned vehicle close to environment, for unmanned flight
The Local Navigation map of device can reflect the information of the new portion on environment.In some embodiments, if nobody flies
Row device leaves the preceding section of environment, then Local Navigation map can no longer reflect the information of the preceding section on environment.
Under certain situation, Local Navigation map can be updated by air traffic control system.In other cases, one or more geography fence devices
The map can be updated.When unmanned vehicle is close to geographical fence apparatus, the geography fence device can be to institute
State unmanned vehicle and the information that can be used for renewal local map is provided.When unmanned vehicle runs into not in the process for performing its task
With geography fence device when, then can update unmanned vehicle map according to various geography fence devices, it is described variously
Fence apparatus is managed with the local information for the geography fence device.
Geography fence device can be such that limitation is applied in unmanned vehicle operation.As it was noted above, example can be with
It is the limitation to unmanned vehicle flight.For example, unmanned vehicle can be not allowed in the border of geography fence device (fly
Row confined area) flight.Other examples of the flight restriction applied by geography fence device can include effective load operation and limit
System, payload positioning limitation, carrier limitation, the object limitation carried, sensor limitation, communication limitation, navigation limitation, electricity
Use limitation or the limitation of any other type.Unmanned vehicle, which can be engaged in, may observe or may not observe the limitation
Activity.Unmanned vehicle flight path can be by different types of limitations affect.It can provide processing different types of flight
The distinct methods of limitation.
Unmanned vehicle (for example, unmanned vehicle B 4210b) just can advance towards destination 4220.If nobody flies
Row device will advance along most direct path (for example, path B), then the unmanned vehicle is possibly into geography fence device
Area in the border of (for example, GF4 4230d).Limitation in the area can be in addition to the presence of unmanned vehicle
Factor.For example, limitation can be height lower limit.It can require that unmanned vehicle flies more than certain height.If nobody
Aircraft can reach the height, then the unmanned vehicle can be allowed to march to destination along path B.However,
If unmanned vehicle can not reach the height, or if reach the height with around the area (for example, along
Path C) compared to the bigger deviation that will cause unmanned vehicle flight path, then the unmanned vehicle can be ordered to bypass
Advance (for example, being advanced along path C) in the area.In another example, limitation can be payload operation (for example,
The seizure of image).If unmanned vehicle can close its camera or without using any image of its cameras capture, the nothing
People's aircraft can along path B advance (when positioned at it is described area in when, its camera be close) and then can its from
Its camera is opened when opening described regional.If however, unmanned vehicle can not close its camera or stop catch image, or
If undesirable unmanned vehicle closes its camera, the route that can specify that the unmanned vehicle is to be bypassed along path C
The area.Therefore, original path or direction can be followed according to the limitation in area, unmanned vehicle, or can quilt
Fixed course is around the area.If unmanned vehicle can not observe limitation, Huo Zheru when in the area
Fruit is to observe limitation around more undesirable unmanned vehicle for the area compared with the route of regulation unmanned vehicle, then can be with
The route for providing the unmanned vehicle is around the area.Determining whether undesirable unmanned vehicle positioned at described
During the limitation being observed when in area, it may be considered that one or more factors.It is determined that providing unmanned vehicle
Route is during should observing territorial restrictions around the area or unmanned vehicle, it may be considered that such as environment bar
The factors such as part, navigation needs, energy efficiency, security or task object.
This goes for when unmanned vehicle is in flight on predefined paths, half predefined paths or real-time route.For example,
When unmanned vehicle is in flight on predefined paths and described regional predefined paths traversal, it can make and keep described pre-
Determine the identical determination that path still changes path.When unmanned vehicle on half predefined paths towards destination fly and it is most straight
When the path connect or described regional path locus traversal, can make be maintained at directapath/along on the path of track still
Change the identical determination in path.When unmanned vehicle flown according to the real-time manual command from user and the user just
Guide the unmanned vehicle towards it is regional when, can make and follow user command and allow the user to guide unmanned flight
Device enters the area or adapter controls and changes the identical determination in path.
Geography fence identifies
Geography fence device can be uniquely identifiable.In some embodiments, geography fence device can have
The unique geographical fence apparatus identifier of its own.Geography fence identifier can from other geography fence devices unique terrestrial reference
Know and geography fence device.Geography fence device can be filled by its geography fence identifier to be different from other geography fences
Put.
Figure 40 shows the example with the system of multiple geography fence devices, and each device has corresponding geography fence mark
Know symbol.First geography fence device 4010a can have the first geography fence identifier (for example, geography fence ID1), the second ground
Managing fence apparatus 4010b can have the second geography fence identifier (for example, geography fence ID2) and the 3rd geography fence to fill
The 3rd geography fence identifier (for example, geography fence ID3) can be had by putting 4010c.One or more unmanned vehicles
4020a, 4020b, which can be located at, to be provided in it in environment of geography fence device.In some embodiments, can provide
Air traffic control system 4030 or other external device (ED)s, it can provide multigroup air traffic control.The generation of air traffic control can be directed to and carried
For any other framework, as herein other it is described everywhere framework.For example, can be in air traffic control system, one or more
Air traffic control is generated or stored at unmanned vehicle or one or more geography fence devices.Only by example and non-limiting
Mode air traffic control system is provided.
Geography fence device can have the geography fence identifier of identified geographic fence apparatus (for example, geography fence
ID1, geography fence ID2, geography fence ID3 ...).Geography fence identifier can be unique for geography fence device.
Other geography fence devices can have the identifier different from the geography fence device.Geography fence identifier can make institute
Geography fence device is stated uniquely to distinguish and/or be distinguished with other individuals.Each geography fence device can only be allocated single
One geography fence identifier.Or geography fence device can register multiple geography fence identifiers.In certain situation
Under, single geography fence identifier can be only distributed to single geography fence device.Or single geography fence mark
Symbol can be shared by multiple geography fence devices.In a preferred embodiment, can be in geography fence device and corresponding geography
There is provided and correspond between fence identifier.
Alternatively, geography fence device can be authenticated to be the authorized geography fence device for geography fence identifier.
Verification process can include the checking to the identity of geographical fence apparatus.In this paper, other are described in further detail everywhere authenticated
The example of journey.
In some embodiments, the ID registration databases of Verification System can keep the identity for geography fence device
Information.ID registration databases can be that each geography fence device distributes unique identifier.Unique identifier can be with
The identifier of the alpha-numeric string being alternatively randomly generated or any other type, it can be from other geography fence devices
Uniquely identify geography fence device.Unique identifier can be generated by ID registration databases or can be selected from not yet
The list of the possibility identifier of distribution.The identifier can be used for being authenticated geographical fence apparatus.ID registration databases
Can with or can not be interacted with one or more geography fence devices.
The one group flight relevant with the geography fence device can be generated based on the information on geography fence device
Control.Information on geography fence device can include the identification information on the geography fence device.Identification information can
With including geography fence identifier or geography fence type of device.In some embodiments, geography fence identifier can refer to
Geographical fence apparatus type is shown.
Geography fence type of device can have any characteristic.For example, geography fence type of device can indicate that geography
The model of fence apparatus, the performance of geography fence device, the scope of geography fence device are (for example, geography fence device is used to examine
Survey or communication objective preset range), the border of geography fence device, the power capability of geography fence device is (for example, the battery longevity
Life), the manufacturer of geography fence device or the Limit Type applied by geography fence device.Geography fence identifier can be from
The geography fence is uniquely identified out in other geography fence devices.Geography fence mark can be received from geography fence device
Symbol.In some cases, geography fence device can have mark module.Geography fence identifier can be stored in mark module
On.In some cases, it can not change or not remove mark module from geography fence device.Geography fence device identification
It can be anti-tamper or anti-distort.
One aspect of the present invention can be related to a kind of method of identified geographic fence apparatus, and methods described includes:Receive
Geography fence identifier, the geography fence identifier uniquely identify out the geography fence from other geography fence devices
Device;One group of air traffic control for unmanned vehicle is generated based on the geography fence identifier;And according to described one
Air traffic control is organized to operate the unmanned vehicle.A kind of geography fence device identification system can be provided, including:One or more
Individual processor, it is operationally configured for either individually or collectively:Receive geography fence identifier, the geography fence
Identifier uniquely identifies out the geography fence device from other geography fence devices;And based on the geography fence mark
Know symbol and generate one group of air traffic control for unmanned vehicle, to allow the unmanned vehicle according to one group of tof tube
The operation of system.The system can also include one or more communication modules, wherein one or more of processors are operable
Ground is coupled to one or more of communication modules.
Figure 25 shows the process for being used to generate one group of air traffic control according to embodiment of the present invention.Geography can be received to enclose
Column device identification 2510.Geography fence device identification can be based on and one group of air traffic control 2520 is provided.
Geography fence device identification can be received by the device or system that can generate one group of air traffic control.It is for example, geographical
Fence apparatus identifier can be received by air traffic control system.Or geography fence device identification can be by unmanned vehicle, described
The one or more processors of geography fence device, user terminal, storage system or any other part or system
Receive.Geography fence device identification can be received by the one or more processors of any part or system.The same part or
System can generate one group of air traffic control.For example, the one or more processors of air traffic control system, unmanned vehicle, geography fence
Device, user terminal, storage system or any other part or system can be based on geography fence device identification
And generate one group of air traffic control.
Can the identity based on geography fence device and generate one group of air traffic control.Geography fence type of device can be based on
And generate one group of air traffic control.The other factors such as unmanned vehicle information, user profile, environmental condition or timing can be with shadow
Ring the generation of one group of air traffic control.
Any kind of air traffic control can be provided, such as other described those air traffic control everywhere herein.Flight
Control goes for any aspect of unmanned vehicle operation.Air traffic control can be with geography fence setting position and/or side
Boundary is associated.One group of air traffic control goes for specific geographic fence apparatus associated there.Another geography fence
Device can have second group of air traffic control, and described group of air traffic control can be applicatory.In some instances, described one group
Air traffic control determines that unmanned vehicle is configured to keep at least preset distance, or described one group with the geography fence device
Air traffic control determines that unmanned vehicle is configured to be maintained at least within preset distance of the geography fence device.Described one
Group air traffic control can include that the unmanned vehicle can not be when being located relative to the pre-position of geography fence device
The flight lower limit that the flight upper limit or the unmanned vehicle above it can not fly thereunder.One group of air traffic control can
With including being used relative to the positioning of geography fence setting position unmanned vehicle payload based on unmanned vehicle
Limitation, or one group of air traffic control can include based on unmanned vehicle relative to the positioning of geography fence setting position and
The limitation used the communication unit of unmanned vehicle.
Each geography fence device can be directed to and generate one group of air traffic control.For example, air traffic control system 4030 can be directed to
Each geography fence device and generate and/or provide multigroup air traffic control.For example, can be to close to the first geography fence device
The unmanned vehicle 4020a of (for example, geography fence ID1 4010a) provide for the first geography fence device one group flies
Row control.Unmanned vehicle can observe one group of air traffic control for the first geography fence device and operate.Unmanned vehicle
It can be communicated with air traffic control system to receive one group of generated air traffic control.In some cases, unmanned vehicle can accuse
Know unmanned vehicle described in air traffic control system close to the first geography fence device.Or geography fence device can inform sky
Unmanned vehicle described in guard system is close to the geography fence device.
Second unmanned vehicle 4020b can be close to another geography fence device (for example, geography fence ID3 4010c).
Second group of air traffic control for another geography fence device can be provided to the second unmanned vehicle.Unmanned vehicle can
To be operated in accordance with second group of air traffic control for another geography fence device.Unmanned vehicle can be with air traffic control system
Communicate to receive one group of generated air traffic control.In some cases, unmanned vehicle can be informed described in air traffic control system
Unmanned vehicle is close to another geography fence device.Or another geography fence device can inform air traffic control system
The unmanned vehicle is close to another geography fence device.
Unmanned vehicle can receive one group of air traffic control for being applicable to the unmanned vehicle.If for example, nobody
Aircraft is located in the range of the first geography fence device but not positioned at second or the 3rd in the range of geography fence device, then institute
One group of air traffic control for the first geography fence device can only be received by stating unmanned vehicle.In some cases, pin
To the unmanned vehicle, one group of air traffic control for the first geography fence device can be only generated.Similarly, if second
Unmanned vehicle is located in the range of the 3rd geography fence device but is not located in the range of the first or second geography fence device,
Then second unmanned vehicle can only receive one group of air traffic control for the 3rd geography fence device.In some feelings
Under condition, for second unmanned vehicle, one group of air traffic control for the 3rd geography fence device can be only generated.
Geography fence certification
The identity of geographical fence apparatus can be authenticated.The identity of geography fence device can be authenticated by experience
Journey and be verified.Verification process can confirm that the geography fence device and the geography fence mark using geography fence identifier
Know the geography fence device belonging to symbol registration to match.
One aspect of the present invention is related to a kind of method being authenticated to geographical fence apparatus, and methods described includes:It is right
The identity of geography fence device is authenticated, wherein the identity of the geography fence device can be unique with other geography fence devices
Ground distinguishes;One group of air traffic control for unmanned vehicle is provided, wherein the air traffic control and certified geography fence
The position of device is relevant;And the unmanned vehicle is operated according to one group of air traffic control.A kind of geography fence device
Verification System can include:One or more processors, it is either individually or collectively configured for:To geographical fence apparatus
Identity be authenticated, wherein the identity of the geography fence device can uniquely distinguish with other geography fence devices;With
And generation is directed to one group of air traffic control of unmanned vehicle, wherein the air traffic control and the position of certified geography fence device
Pass is equipped with, to allow operation of the unmanned vehicle according to one group of air traffic control.The system can also include one
Or multiple communication modules, wherein one or more of processors are operably coupled to one or more of communication modules.
Figure 26 is shown according to embodiment of the present invention for the process that is authenticated to geographical fence apparatus.It can receive
Geography fence device identification 2610.2620 can be authenticated to the identity of geographical fence apparatus.One group of flight can be provided
Control 2630.
Geography fence device identification can be received by the device or system that can generate one group of air traffic control.It is for example, geographical
Fence apparatus identifier can be received by air traffic control system.Or geography fence device identification can be by unmanned vehicle, described
The one or more processors of geography fence device, user terminal, storage system or any other part or system
Receive.Geography fence device identification can be received by the one or more processors of any part or system.The same part or
System can generate one group of air traffic control.For example, the one or more processors of air traffic control system, unmanned vehicle, geography fence
Device, user terminal, storage system or any other part or system can be based on geography fence device identification
And generate one group of air traffic control.
One group of air traffic control can be generated after geography fence device identification is received.Can be to geographical fence apparatus
Identity be authenticated after generate one group of air traffic control.Can the identity based on geography fence device and generate one group of tof tube
System.One group of air traffic control can be generated in the case where not considering geography fence device identity.One group of tof tube can generated
The certification to geographical fence apparatus identity is required before system.Or even if geography fence device can also generate without certification
One group of air traffic control.In some embodiments, if geography fence device passes through certification, the geography fence can be directed to
Device and first group of air traffic control is provided, if geography fence device without certification, can be directed to the geography fence and
Second group of air traffic control is provided.First group of air traffic control and second group of air traffic control can be different.In some embodiments
In, second group of air traffic control can be more tightened up than first group or restricted higher.Geography fence type of device can be based on and given birth to
Into one group of air traffic control.The other factors such as unmanned vehicle information, user profile, environmental condition or timing can influence one
The generation of group air traffic control.
Geographical fence apparatus can be authenticated using any verification process.Other described are everywhere used for herein
Go for the certification to geographical fence apparatus to any technology that other devices are authenticated.For example, to user or nothing
People's aircraft is authenticated the middle process used and goes for geography fence device.In one example, can be by means of ground
The key on fence apparatus is managed to be authenticated to the geography fence device.Geography fence key can be can not be from described
Removed on geography fence device.Alternatively, key can not enclose in the case where not damaging geography fence device from the geography
Column device removes.Key can be stored in the mark module of geography fence device.In some cases, mark module can not be
Removed in the case of not damaging geography fence device from the geography fence device.Mark module can have as other are each herein
Any characteristic of the mark module (for example, unmanned vehicle mark module) of any other type of place description.
Geography fence certification
Via the geography fence of authentication center
Certified unmanned vehicle can broadcast its position and IMSI via Radio Link, and it can have containing signature
The information of property.In addition, unmanned vehicle and authentication center, which can have, consults simultaneously caused one group of reliable CK1 and IK1,
It is characterized as being SCS1 (secure communication collection).
Geography fence device is similarly by authentication center's certification.Specifically, similar to the certification to unmanned vehicle, ground
Reason fence apparatus and authentication center can consult and produce reliable CK2 and IK2, and it is characterized as being SCS2.
Wireless channel for the communication between geography fence device and unmanned vehicle can pass through such as time-division, frequency division
Or code division etc. is multiplexed each channel and carries out the mode of multiple access arrangement to realize.Sent by unmanned vehicle or geography fence device
Wireless messages can be sent in the form of signature authentication (in the form of described in such as Figure 16).Therefore, when message to be sent
(MSG) when, transmitted information format is as follows:
Equation 1:MSG1||((HASH(MSG1)||SCR()(+)SCR(IK))||IMSI
Wherein MSG1=MSG | | RAND | | TIMESTAMP | | GPS
In above equation 1, SCR () can be common cipher code generator, and SCR (IK) can be data derived from IK
Mask.In addition, in this manual, MSG is origination message, and HASH () is hash function, and RAND is random number, TIMESTAMP
It is current time stamp, and GPS is current location, to avoid playback formula from attacking.
When receiving the information of above-mentioned unmanned vehicle, geography fence device can set up the lattice chain with authentication center
Connect and report the IMSI of unmanned vehicle.Whether authentication center can inquire about allows unmanned vehicle to appear in the area
In.If the inquiry indicate forbid unmanned vehicle enter the area or indicate restricted information need to transmit to
Unmanned vehicle, then authentication center can be via network signals geography fence device, and geography fence device will be recognized by signature
The mode of card sends restricted information.
The information sent by geography fence device cannot be forged and can controlled by authentication center.Receiving by ground
After managing the information that fence apparatus is sent, unmanned vehicle can be via remote control and/or public communication network and authentication center
Foundation CK1 protection link and continue provide encrypted transmission.By this way, unmanned vehicle can will by it is described nobody fly
The geography fence information that row device receives, which is sent to authentication center, to be authenticated.Successfully confirming that geography fence information truth is reliable
Afterwards, unmanned vehicle can understand the content in geography fence device.Meanwhile it can be reported via remote control to user
Accuse.In some instances, Flight Path amendment can be made by user or unmanned vehicle itself.
During flight, unmanned vehicle can announce its position or its destination.Know such letter in authentication center
Cease and find that the unmanned vehicle cannot enter after corresponding area, it, which can send, forbids information, it is desirable to which nobody flies
Row device makes a return voyage.Procedures described above can definitely be realized and can bear various attacks.If for example, unmanned vehicle
Confined area is gone successively to, then authentication center can record swarming into and being reported to interested regulatory authorities for the unmanned vehicle
It is described to swarm into.
Do not pass through authentication center
Certified unmanned vehicle can have with radio broadcasting digital signature characteristic relevant information (such as its ID, its
Position and its navigation channel) and other such information.In geography fence device after unmanned vehicle receives information above, it can
To be connected to air traffic control system via network and report the IMSI of the unmanned vehicle.Air traffic control system can then determine nothing
Whether people's aircraft occurs in this region.If it is determined that the unmanned vehicle cannot enter it is described regional or limited
Property information processed needs to inform unmanned vehicle, then air traffic control system can be by network signals geography fence device, and geography encloses
Column device can send restricted information by way of signature authentication.The information sent by geography fence device cannot forge simultaneously
And it can be controlled by authentication center.The secure infomation passageway from authentication center to unmanned vehicle is described below.
Some public key algorithms can be used in embodiments of the present invention.According to public key algorithm, Ke Yixuan
Select password pair.Password public keys and private cipher key to being made up of.Therefore it provides two passwords pair.Geography fence device and recognize
Card center each controls the private cipher key of their own respectively.The geography fence device private cipher key controlled by geography fence device is remembered
For KP, and corresponding public-key cryptography is designated as KO.The authentication center's private cipher key controlled by authentication center is designated as CAP, and corresponding
The public-key cryptography of authentication center is designated as CAO.
In this example, when registering geographical fence apparatus, password to the KP private cipher key of geography fence device (be directed to) and
KO (public-key cryptography for being directed to geography fence device) can be distributed by authentication center and be reported and submitted authentication center.Geography fence device
Private cipher key (KP) both can not be read or can not be replicated.In addition, authentication center can use the private cipher key of authentication center
(CAP) public-key cryptography (KO) of geographical fence apparatus is encrypted, with the C that Generates Certificate.Air traffic control system obtains from authentication center
Certificate C simultaneously sends it to geography fence device.In addition, to be sent to the MSG of unmanned vehicle can be first subjected to Hash letter
Number HASH effect with generate summary D.Then can use geography fence device private cipher key (KP) MSG is encrypted with
Form signature S.Further, geography fence device can send C, S and MSG by wireless channel to unmanned vehicle.
After unmanned vehicle receives C, S and MSG, it can use the public-key cryptography (CAO) of known authentication device
C is decrypted to obtain the public-key cryptography of geography fence device (KO), and can also use KO that signature S is decrypted with
Obtain the summary D1 of decryption.In addition, unmanned vehicle can perform hash function HASH to obtain summary D to MSG.Unmanned flight
Device can compare the summary D1 and summary D of decryption.If both are identical, unmanned vehicle can be to being sent out by geography fence device
The MSG sent is authenticated.Therefore, can be securely communicated with each other using above-mentioned signature process, unmanned vehicle and authentication center.
During flight, unmanned vehicle can announce its position or target.When receiving the position of unmanned vehicle,
If it is determined that unmanned vehicle is forbidden entering corresponding spatial domain, then authentication center can send restricted information and ask nobody to fly
Row device makes a return voyage.Said process can safely carry out and can bear various attacks.If unmanned vehicle is gone successively to, recognize
The violation that card center can record unmanned vehicle enters and reported to regulator.
Alternately, geography fence device can continue to the restricted information of One-to-All Broadcast.Certification to described information with
Said process is identical.Restricted information can indicate that the flight authority of various types of unmanned vehicles in this region.In addition,
Wireless channel for being communicated between geography fence device and unmanned vehicle can be believed by time-division, frequency division or code division etc.
The mode of road multiplexing carries out multiple access arrangement.
Air traffic control system can be with active push information
According to the unmanned vehicle for preparing to fly and the position of the unmanned vehicle to fly and plan navigation channel, blank pipe system
System can determine that geography fence may be affected in real time.In the example, air traffic control system can be each unmanned vehicle
Prepare the geography fence list to be avoided.Each unmanned vehicle geography fence to be avoided may be according to unmanned vehicle, nothing
The user of people's aircraft and the rank of aerial mission and be affected.In addition, air traffic control system can pass through air traffic control system and nobody
Encryption channel between aircraft and send the list to unmanned vehicle, the list is then forwarded to user.
Before flight and during flight, the unmanned vehicle with electronic map can receive by air traffic control system push
Information.Unmanned vehicle can also receive the position on the geography fence near such as unmanned vehicle and its navigation channel, effect
The information such as scope, effect period.Unmanned vehicle can also send back clearly to receive to air traffic control system to be confirmed.Unmanned vehicle
Can with active obtaining and update its navigation channel near effective geography fence information and to air traffic control system provide as information.
When information as active offer, unmanned vehicle may not necessarily send back reception to air traffic control system and confirm.
When air traffic control system pushed information and during when unmanned vehicle active obtaining information, system, which can be used to ensure that, to be sent
The main body of information is not counterfeited and information is not yet manipulated.Connected by using the secure communication established during verification process
To push and obtain information, it can be ensured that communication security., please on establishing the details of the secure communication connection and security control
With reference to foregoing character.
Data storage with relevant identifier
Figure 27 shows another example that can store device information in memory according to embodiment of the present invention.
Storage system 2710 can be provided.It can provide from one or more user 2715a, 2715b, one
Or multiple user terminal 2720a, 2720b, one or more unmanned vehicle 2730a, 2730b and/or one or more
Geography fence device 2750a, 2750b information.Described information can include any kind of data (for example, one or more
Order, environmental data), data source (for example, producing the identifier of the device of data therefrom) and relevant apparatus identifier (example
Such as, associated user identifier, associated unmanned vehicle identifier, associated geography fence identifier) and/or
Any other associated timing information of person or other associated information.One or more groups of information 2740 can be stored.
Storage system 2710 can include one or more Memory Storage Units.Storage system can be with
One or more databases including information described herein can be stored.Storage system can include computer-readable
Medium.Storage system can have any other memory storage described herein (for example, the memory in Figure 11
Storage system) any characteristic.Storage system can be provided in single opening position or can be distributed in multiple positions
On.In some embodiments, storage system can include single Memory Storage Unit or multiple memory storages
Unit.Cloud computer architecture can be provided.In some cases, reciprocity (P2P) storage system can be provided.
Storage system can be provided outside unmanned vehicle machine.Can above it be carried in the device outside unmanned vehicle
For storage system.Storage system can be provided outside remote control.Can be on the device outside remote control
Storage system is provided.Storage system can be provided outside unmanned vehicle and remote control.Memory storage
System can be a part for Verification System.Storage system can be a part for air traffic control system.Memory storage system
System can include one or more memory cells, and the memory cell can be the one of the Verification Systems such as air traffic control system
Individual or multiple memory cells.Or storage system can separate with Verification System.Storage system can be by
Possess and/or operate with Verification System identical entity.Or storage system can be by the reality different from Verification System
Body possesses and/or operated.
Communication system can include one or more loggers.One or more of loggers can be from communication system
Any device receives data.For example, one or more loggers can receive data from one or more unmanned vehicles.One
Or multiple loggers can be from one or more users and/or remote control data.Can be on one or more loggers
One or more Memory Storage Units are provided.For example, can be from unmanned vehicle, user and/or remote control one
Or provide one or more Memory Storage Units on one or more loggers of multiple message.One or more of records
Device can have or can not have the scope of limited receive information.For example, logger may be configured for from positioned at
Data are received with the device in the logger identical physical region.For example, when unmanned vehicle is located in the firstth area, the
One logger can be from the unmanned vehicle receive information, and when unmanned vehicle is located in the secondth area, the second logger
Can be from the unmanned vehicle receive information.Or logger without limited scope and can from device (for example,
Unmanned vehicle, remote control, geography fence device) receive information is regardless of whether described device is located at where.Logger can be deposited
Reservoir memory cell and/or the information that collects can be transmitted to Memory Storage Unit.
Information from one or more data sources can store in memory.Data source can be any to be remembered
Record the device or entity in the source of data.For example, for data 1, data source can be the first unmanned vehicle (for example, nobody
Aircraft 1).For data 2, data source can be the second unmanned vehicle (for example, unmanned vehicle 2).Data source can be
User, user terminal (for example, remote control), unmanned vehicle, geography fence device, logger, external sensor or it is any its
The device of his type.Information can be relevant with that can store data source in memory.
For example, the information on one or more user 2715a, 2715b can be stored in storage system.Institute
User identity information can be included by stating information.The example of user identity information can include user identifier (for example, ID 1,
ID 2, ID 3 ...).The user identifier can be unique for the user.In some cases, come from
The information of user can include contributing to mark and/or the information of certification user.Information from one or more users can be with
Including the information on the user.Information from one or more users can include the data from the user.
In one example, data can include one or more orders from user.One or more order can include realizing nothing
The order of the operation of people's aircraft.The information of any other type can be provided by one or more users and can be stored in
In storage system.
In some embodiments, all user's inputs can be stored in storage system as data.Or
Person, only selected user input can be stored in storage system.In some cases, only certain form of use
Family input is stored in storage system.For example, in some embodiments, only user identifies input and/or order
Information storage is in storage system.
User can carry optionally with the aid of one or more user terminal 2720a, 2720b to storage system
For information.User terminal can be the device that can be interacted with user.User terminal be able to can enter with unmanned vehicle
Row interaction.User terminal can be arranged to the remote control for sending one or more operational orders to unmanned vehicle.
User terminal can be arranged to show the display device of data based on the information received from unmanned vehicle.User terminal
Not only information can be sent but also from unmanned vehicle receive information to unmanned vehicle.In some embodiments, user is whole
End can be the data source of the data for being stored in storage system.For example, remote control 1 can be the source of data 4.
User can provide information by means of the device of any other type to storage system.For example, it can carry
For one or more computers or other devices, it can receive user's input.Described device can be to storage
Device storage communication user inputs.Described device with unmanned vehicle without interacting.
User terminal 2720a, 2720b can provide data to storage system.User terminal can be provided and used
The information of the relevant information of family, user command or any other type.User terminal can be provided on user terminal itself
Information.For example, user terminal identification can be provided.In some cases, user identifier and/or user terminal can be provided
Identifier.User key and/or user terminal key can be alternatively provided.In some instances, user does not provide and user
The relevant any input of key, but user key information can store on the subscriber terminal or can be visited by user terminal
Ask.In some cases, user key information can be stored on the physical storage of user terminal.Or user key
Information can be stored in outside physical storage (for example, on cloud) and can be by user terminal access.At some
In embodiment, user terminal can transmit user identifier and/or associated order.
Unmanned vehicle 2730a, 2730b can provide information to storage system.Unmanned vehicle can provide
The information relevant with the unmanned vehicle.For example, unmanned vehicle identification information can be provided.Unmanned vehicle identification information
Example can include unmanned vehicle identifier (for example, unmanned vehicle ID1, unmanned vehicle ID2, unmanned vehicle
ID3……).Unmanned vehicle identifier can be unique for unmanned vehicle.In some cases, from unmanned flight
The information of device can include contributing to mark and/or the information of certification unmanned vehicle.From one or more unmanned vehicles
Information can include information on the unmanned vehicle.Information from one or more unmanned vehicles can include
Any data (for example, data 1, data 2, data 3 ...) received by the unmanned vehicle.Data can include realizing nothing
The order of the operation of people's aircraft.The information of any other type can be provided by one or more unmanned vehicles and can be with
It is stored in storage system.
Geography fence device 2750a, 2750b can provide information to storage system.Geography fence device can be with
The information relevant with the geography fence device is provided.For example, geography fence device identification information can be provided.Geography fence fills
Geography fence device identification can be included (for example, geography fence device 1, geography fence device by putting the example of identification information
2……).Geography fence device identification can be unique for geography fence device.In some cases, enclosed from geography
The information of column device can include the information for contributing to geography fence device described in mark and/or certification.From one or more
The information of geography fence device can include the information on the geography fence device.From one or more unmanned vehicles
Information can include any data (for example, data 5, data 6 ...) for being received by geography fence device.The data can be with
Position including geography fence device, the situation of the unmanned vehicle detected or presence or the letter relevant with air traffic control
Breath.The information of any other type can be provided by one or more geography fence devices and can be stored in memory storage
In system.
Can be before by the related information storage of any device described herein in storage system to institute
Device is stated to be authenticated.For example, can be before by the related information storage of user in storage system to the use
Family is authenticated.For example, the user can be entered before obtaining and/or storing user identifier by storage system
Row certification.Therefore, in some implementations, only certified user identifier is stored in storage system.Or use
The user identifier that family needs not move through certification and claimed can be stored in storage system before certification.If
By certification, then the instruction that user identifier has been verified can be made.If not authenticated, user's mark can be made
Know symbol and be marked as the instruction of suspicious activity, or make the finger for the authentication attempt that failure is carried out using the user identifier
Show.
It is alternatively possible to the nothing before by the related information storage of unmanned vehicle in storage system
People's aircraft is authenticated.For example, can be before obtaining and/or storing unmanned vehicle identifier by storage system
The unmanned vehicle is authenticated.Therefore, in some implementations, only certified unmanned vehicle identifier is stored in
In storage system.Or the unmanned vehicle unmanned vehicle identifier that needs not move through certification and claimed can be with
It is stored in before certification in storage system.If by certification, unmanned vehicle identifier can be made and obtained
To the instruction of checking.If not authenticated, the finger that unmanned vehicle identifier has been marked as suspicious activity can be made
Show, or make the instruction for the authentication attempt that failure is carried out using the unmanned vehicle identifier.
Similarly, can be before by the related information storage of geography fence device in storage system to described
Geography fence device is authenticated.For example, it can be identified obtaining and/or storing geographical fence apparatus by storage system
The geography fence device is authenticated before symbol.Therefore, in some implementations, only certified geography fence device mark
Know symbol to be stored in storage system.Or the geography fence that geography fence device needs not move through certification and claimed
Device identification can be stored in storage system before certification.If by certification, geography can be made and enclosed
The instruction that column device identification has been verified.If not authenticated, can make geography fence device identification by
Labeled as the instruction of suspicious activity, or make the finger for the authentication attempt that failure is carried out using the geography fence device identification
Show.
Except data source, the relevant apparatus information on corresponding data can also be stored.If for example, send order,
Relevant apparatus can include the device for sending order and/or the device for receiving order.Data source can send the device of order.
In another example, data can be by the sensor collection on unmanned vehicle machine.Data source can be unmanned vehicle.Nobody
The data transfer sensed to multiple devices, described device can be included in the information on relevant apparatus by aircraft
In.For example, data 3 can be sensed by unmanned vehicle 1, and unmanned vehicle 1 can to user's (for example, ID 3) and
Geography fence device (for example, geography fence device 2) sends described device.Relevant apparatus information can include user, user's end
Hold the dress of (for example, remote control), unmanned vehicle, geography fence device, logger, external sensor or any other type
Put.
Memory Storage Unit can store one or more groups of information 2740.The multipacket message can be included to use by oneself
Family, user terminal, unmanned vehicle, geography fence device, logger, external sensor or any other type device letter
Breath.The multipacket message can include one or more groups of data, data source and the information on relevant apparatus.In certain situation
Under, single data item can be provided for a single group information.Or multiple data can be provided for a single group information
.
Storage system can store the relevant multipacket message of specific interaction between two devices.For example, can
To send multiple orders during interaction between two.Interaction can be the execution of task.In some cases, store
Device memory cell can only store the information on specific interaction.Or storage system can be stored on two dresses
Information repeatedly interactive between putting.Storage system alternatively can store information according to the identifier of specific device.
Together with the data associated with same device (for example, same unmanned vehicle) can store.Or Memory Storage Unit
Information can be stored according to device identification.The data associated with the particular combination of device or device can be stored in one
Rise.
Or storage system can store multigroup letter on the interaction between multiple devices or multigroup device
Breath.Storage system can be collect from multiple users, user terminal, unmanned vehicle, geography fence device or its
The data storage bank of the information of his device.Storage system can store the information from multiple tasks, and it can include
Each user, each user terminal, each unmanned vehicle, each geography fence device and/or its various combination.In some feelings
Under condition, the information collection in storage system can search for or can index.Can according to any parameter, such as with
Family identity, user terminal identity, unmanned vehicle identity, geography fence device identity, time, device combination, data type, position
Put or any other information, to find or index information collection.Information collection can be stored according to any parameter.
In some cases, the information in storage system can be analyzed.Information collection can be analyzed to detect one
Or multiple behavior patterns.Information collection can be analyzed with detect may be relevant with accident or undesirable condition one or more characteristics.
Information collection can be used for analyzing air traffic.Statistical analysis can be carried out to the information collection in Memory Storage Unit.This
The statistical analysis of sample can aid in mark trend or correlative factor.As an example, it can be noted that some unmanned vehicle models are total
There can be higher accident rate than other unmanned vehicle models on body.Therefore, can be with comprehensive analysis storage system
In information to collect the information of the operation on unmanned vehicle.Such comprehensive analysis is without in response to particular event or field
Scape.
Can be with real-time update storage system.For example, when transmitting or receiving data, the information on the data
It can be recorded in together with any other information of described information collection in storage system.This can occur in real time.
Can send or receive order less than 10 minutes, 5 minutes, 3 minutes, 2 minutes, 1 minute, 30 seconds, 15 seconds, 10 seconds, 5 seconds, 3
Any relevant information that data and described information are concentrated is stored in second, 1 second, 0.5 second or 0.1 second.
In the alternative, can be without real-time update storage system.Can be with rule or irregular
Time interval is updated periodically storage system.In some cases, renewal time table, the timetable can be provided
Rule or irregular renewal time can be included.Renewal time table can be fixed or can be modifiable.Can be with
Storage system is updated in response to the event or the situation that detect.
Described information collection can be stored any time section by storage system.In some cases, can be indefinitely
Ground stores described information collection until they are deleted.It can allow or can not allow to delete information collection.In some cases,
The manipulator or manager that storage system can only be allowed enter with the data being stored in the storage system
Row interaction.In some cases, manipulator and the storage of Verification System (for example, air traffic control system, authentication center) can only be allowed
Data in storage system interact.
It is alternatively possible to described information collection is automatically deleted over time, become.The period can be preestablished
's.For example, described information collection can be automatically deleted after more than predetermined amount of time.The example of predetermined amount of time can include but
It is not limited to 20 years, 15 years, 12 years, 10 years, 7 years, 5 years, 4 years, 3 years, 2 years, 1 year, 9 months, 6 months, 3 months, 2 months, 1
The moon, 4 weeks, 3 weeks, 2 weeks, 1 week, 4 days, 3 days, 2 days, 1 day, 18 hours, 12 hours, 6 hours, 3 hours, 1 hour, 30 minutes or 10
Minute.In some cases, information collection can just be deleted manually only after predetermined amount of time is pass by.
The geography fence limitation of identity-based
One or more groups of air traffic control in environment can correspond to one or more geography fence devices.Every group of tof tube
System can be associated with geography fence device.In some embodiments, one group of only single air traffic control and geography fence
Device is associated.No matter, can be with for example, the number or type of the unmanned vehicle that can be interacted with geography fence device
It is applicable one group of air traffic control of identical.Or multigroup air traffic control can be associated with geography fence device.This can occur
When multiple unmanned vehicles interact with geography fence device.Each group in multigroup unmanned vehicle can have its own
One group of air traffic control.For example, the first unmanned vehicle can have first group of air traffic control, and second group of unmanned vehicle can
With with second group of air traffic control.The limitation provided by first group of air traffic control and second group of air traffic control can be different.
In some cases, difference be probably due to the identity of unmanned vehicle and it is caused (for example, the first unmanned vehicle identity with
The difference of second unmanned vehicle identity).Difference be probably due to the identity of user and it is caused (for example, operation first nobody
The difference of the identity of first user of aircraft and the identity of the second user of the second unmanned vehicle of operation).Difference is probably
It is caused due to any other factor (such as time, environmental condition or any other factor).One group of air traffic control can be with
Single geographical fence apparatus is associated.
Figure 28 shows that the geography fence device 2810 of one group of different flight restrictions can be provided in different scenes.It is described not
With one group of flight restriction can be with identical border or can be with different border 2820a, 2820b.Different nothings
People's aircraft 2830a, 2830b, 2840a, 2840b can receive one group of different flight restrictions.
A certain opening position that can be in environment provides geography fence device 2810.Can be to the environment near the position
Interior unmanned vehicle provides one group of air traffic control.If multiple unmanned vehicles are located in the environment near the position,
They can each receive one group of air traffic control.Multigroup air traffic control between multiple unmanned vehicles can be identical.It is more
Multigroup air traffic control between individual unmanned vehicle can be different.In one example, the difference in multigroup air traffic control
Can the identity based on unmanned vehicle.Difference in multigroup air traffic control can be based on unmanned vehicle type.For example, first
Group unmanned vehicle 2830a, 2830b can have the first unmanned vehicle type, and second group of unmanned vehicle 2840a,
2840b can have the second unmanned vehicle type.The unmanned vehicle of the first kind and the unmanned vehicle of Second Type can
To be different.Any description to the difference of multigroup air traffic control based on unmanned vehicle type only passes through example herein
Mode provides, and goes for the factor that can cause any other type of different multigroup air traffic control.These factors
User profile (for example, user identity, user type), environmental condition, timing, other unmanned vehicle information or sheet can be included
The factor of other described any other types everywhere of text.
First group of unmanned vehicle can receive first group of air traffic control, and second group of unmanned vehicle can receive second
Group air traffic control.First group of air traffic control and second group of air traffic control can be different.For example, first group of unmanned vehicle
2830a, 2830b can receive first group of air traffic control, and second group of unmanned vehicle 2840a, 2840b can be received for ground
Manage second group of air traffic control of fence apparatus 2810.Border between first group of air traffic control and second group of air traffic control can be
Different.Therefore, for same geography fence device, multigroup border can be provided by multigroup air traffic control.First group flies
Row control can have first group of border, and second group of air traffic control can have second group of border.In some cases, it is single
One group of air traffic control can have multigroup border.For example, even if single unmanned vehicle receives one group of air traffic control, also may be used
Multigroup border be present, not same district either at multiple areas, different time is still for the different condition that detects
Not same district or any other factor.First group of border can be provided in for the first of first group of unmanned vehicle group control
2820a, and second group of border 2820b can be provided in for the second of second group of unmanned vehicle group control.Border can
With with different size or shape.Border can be with overlapping.
In the examples provided, border can limit the presence of unmanned vehicle.This is only provided by way of example
And the limitation of any other type goes for border.First group of air traffic control can be limited with first group of border 2820a
Unmanned vehicle 2830a, 2830b of the first kind presence in system area.Therefore, the unmanned vehicle of the first kind can not
Into first group of border.Unmanned vehicle 2840a, 2840b of Second Type can not receive first group of air traffic control and therefore
It can not be limited by what is limited from first group of air traffic control.Therefore, the unmanned vehicle of Second Type can enter first
(for example, unmanned vehicle 2840b is come into first group of border 2820a) in group border.
Second group of air traffic control can limit the unmanned vehicle of Second Type in area with second group of border 2820b
2840a, 2840b presence.Therefore, the unmanned vehicle of Second Type can not enter second group of border.The nothing of the first kind
People's aircraft 2830a, 2830b can not receive second group of air traffic control and therefore can not be by from second group of air traffic control
The limitation of limitation.Therefore, the unmanned vehicle of the first kind can enter in second group of border (for example, unmanned vehicle 2830b
Come into second group of border 2820b).
Therefore, even single geography fence device can also have high flexibility ratio.Geography fence device can
There is provided in different situations for may be close to the different unmanned vehicles of geography fence device for different groups of tof tubes
The reference point of system, the geography fence device can provide height to the Activity Type near geographical fence apparatus and control, and nothing
Any change or renewal need to be carried out in itself to geographical fence apparatus.In some embodiments, can geography fence device it
The outer multigroup air traffic control of generation, therefore any renewal or ad hoc rules can be directed to and geographical fence apparatus need not can be carried out in itself
Outside the geography fence device of any change.In some cases, geography fence device can generate multigroup fly thereon in itself
Row control, but can receive to parameter, algorithm or from cloud be used for generate one group of air traffic control data renewal.It is geographical
Fence apparatus need not receive any be manually entered during its function is performed.Or user can select to provide for ground
Manage individualization request or the input of fence apparatus.
Geography fence device changes over time
As it was noted above, one group of air traffic control can change over time.Geography fence is run at different time
The unmanned vehicle of device can have one group of different air traffic control.In some embodiments, one group of air traffic control
It is applicable to specifically meet or the specific time.For example, if unmanned vehicle is for the first time close to geographical fence apparatus, institute
First group of air traffic control can be received by stating unmanned vehicle.If unmanned vehicle will fly and then return simultaneously elsewhere
Geography fence device is run into for the second time, then the unmanned vehicle can receive second group of air traffic control.First group and second group
It can be identical.Or they can be different.One group of air traffic control may have been based on time or other conditions
(environmental condition such as detected) and change.Therefore, can be flown according to condition (for example, time, environmental condition) to nobody
Row device delivers different groups of flying conditions.One group of flying condition is in itself without including any condition.In other embodiments,
One group of air traffic control can include different conditions, including timing.For example, the one group of tof tube provided for unmanned vehicle
System can indicate that 3:Before 00pm, first group of border and limitation are applicable, 3:00pm and 5:Between 00pm, second group of border
It is applicable with limitation, and 5:After 00pm, the 3rd group of border and limitation are applicable.Therefore, one group of flight restriction can include root
According to different condition (for example, time, environmental condition etc.) to the different group borders of unmanned vehicle and limitation.
But, there is provided one group of air traffic control, unmanned vehicle can take according to conditions such as time or environmental conditions
Limited from the difference to geographical fence apparatus.
Figure 29 show with can over time and change multigroup air traffic control geography fence device example.Control
Change over time can be provided only by way of example, and go for the condition of any other type, all
Such as environmental condition.For example, if example describes the change of the very first time, the second time, the 3rd time etc., the example
Go for first group of environmental condition, second group of environmental condition, the 3rd group of environmental condition or any other group of condition (for example,
First group of condition, second group of condition, the 3rd group of condition).
Geographical fence apparatus 2910 can be illustrated at different time (time=A, B, C or D).Can be in different time
Or provide different conditions in the opening position of different time.Unmanned vehicle 2920 can be provided about in geography fence device.
The unmanned vehicle illustrated at different time can be same unmanned vehicle or can be different unmanned vehicles.It is geographical
Fence apparatus can have one group of border 2930a, 2930b, 2930c, 2930d.
The border can change over time.For example, one group of border during the very first time (for example, time=A)
2930a can be differently configured from one group of border 2930b during the second time (for example, time=B).Border can change by any means
Become.For example, the lateral part on border can change (for example, border during border 2930a and time=C during time=A
2930c) and/or the vertical component on border can change (for example, during border 2930a and time=B during time=A
Border 2930b).In some cases, the laterally and vertically part on border can change (for example, border during time=B simultaneously
Border 2930c during 2930b and time=C).The size and/or shape on border can change.In some cases, border can
To keep constant in different time.For example, one group of border 2930a during the very first time (for example, time=A) can be with second
One group of border 2930d during time (for example, time=D) is identical.
The Limit Type applied on border can change over time.Although one group of border keeps constant,
Limit Type can change.For example, at the very first time (for example, time=A), border 2930a can be with the second time (example
Such as, time=D) when border 2930d it is identical.However, first group of limitation goes for the very first time (for example, in time=A
When, unmanned vehicle 2920 can be not allowed into the 2930a of border), and second group of limitation goes for the second time (example
Such as, in time=D, unmanned vehicle 2920 can be allowed to enter in the 2930d of border, but can alternatively apply other limits
System, do not allow such as to operate payload).Although border keeps constant, the type of limitation can be different.Although border
Keep constant and Limit Type is identical, but the grade limited can be different (for example, not allowing to use any radio communication
Radio communication is used with being only allowed in particular frequency range).
In some embodiments, the Limit Type applied on border can keep constant, and border pushes away with the time
Move and change.For example, at the very first time (for example, time=A), border 2930a can be on the second time (for example, the time
=B) when border 2930b and change.First group of limitation goes for the very first time and second group of limitation goes for
Two times.First group of limitation can be identical with second group of limitation.For example, in time=A, unmanned vehicle 2920 can not be permitted
Perhaps enter in the 2930a of border.In time=B, unmanned vehicle can be equally not allowed into the 2930b of border, but border
May change, with allow unmanned vehicle enter the unmanned vehicle be previously unable to enough entrance region and/
Or unmanned vehicle can not enter the region that the unmanned vehicle can previously enter.Unmanned vehicle can energy
The region enough entered may change with the change on border.
Or first group of limitation can differ with second group of limitation.For example, in time=B, unmanned vehicle can not
It is allowed to enter in the 2930b of border.In time=C, unmanned vehicle be able to can enter in the 2930c of border, but work as and be located at
Any radio communication can not be sent when in border.Therefore, the border and one group of limitation can change.It is described
One group of limitation can change with so that Limit Type changes.One group of limitation can change to allow Limit Type phase
Together, but limit grade can change.
Unmanned vehicle can run into geography fence device in all cases.Different situations can be provided in order
(unmanned vehicle either runs into geography fence device under different conditions at multiple time points multiple) or can be alternative
Different situations is provided in embodiment (for example, unmanned vehicle in theory can be in different time points or in different groups of bars
Geography fence device is reached under part first).
In some embodiments, occur in the case of there can be indicant not requiring geography fence device to one group
The change of air traffic control.For example, air traffic control system is known that geography fence device and unmanned vehicle position.Air traffic control system can be with
Unmanned vehicle is detected when in the preset range of geography fence device.When unmanned vehicle is close to geographical fence apparatus
When, air traffic control system is known that one group of condition (for example, current time, environmental condition, unmanned vehicle identity or type, user
Identity or type etc.).Based on the condition, air traffic control system can provide one group of air traffic control to unmanned vehicle.Unmanned flight
Device need not detect geography fence device, without the indicant on detection geography fence device, although unmanned vehicle can be with this
Do, such as other are described everywhere herein.
In another example, when unmanned vehicle is close to geographical fence apparatus, the geography fence device can detect
To the presence of unmanned vehicle.When unmanned vehicle is come in the preset range of geography fence device, the geography fence dress
The unmanned vehicle can be detected by putting.When unmanned vehicle is close to geographical fence apparatus, the geography fence device can
To know one group of condition (for example, current time, environmental condition, unmanned vehicle identity or type, user identity or type etc.).
Based on the condition, geography fence device can provide one group of air traffic control for unmanned vehicle.Unmanned vehicle is without detection
Geography fence device, without detection geography fence device indicant, although unmanned vehicle can so be done, such as herein its
He is described everywhere.
In addition, unmanned vehicle can generate one group of air traffic control on machine.Unmanned vehicle can detect geography fence
The presence of device.Or can be provided to unmanned vehicle from air traffic control system or geography fence device on unmanned flight
Information of the device to the distance of geography fence device.When unmanned vehicle is close to geographical fence apparatus, the unmanned vehicle can
To know one group of condition (for example, current time, environmental condition, unmanned vehicle identity or type, user identity or type etc.).
Based on the condition, unmanned vehicle can generate one group of air traffic control on the unmanned vehicle machine.Unmanned vehicle without
Geography fence device need to be detected, without the indicant on detection geography fence device, although the unmanned vehicle can be with this
Sample is done, and such as other are described everywhere herein.
In other embodiments, geography fence device 2910 can include indicant 2940.The indicant can be
Such as other described any kind of indicants everywhere herein.Although visual indicia only provides by way of example, can
To use the indicant of the indicant, such as wireless signal, thermal signal, acoustical signal or any other type of any other type.
Unmanned vehicle can detect the indicant of geography fence device.When unmanned vehicle close to geographical fence apparatus (for example,
Into in the preset range of geography fence device) when, unmanned vehicle can detect the indicant.
Indicant can change over time.The change of indicant can reflect different conditions.Indicant can
With periodically (for example, with rule or irregular time interval), according to preset time table or the thing in response to detecting
Part or situation and change.The change of indicant can voluntarily be started by geography fence device.Geography fence device can have pair
Which one group of instruction of which indicant be provided in the case of.It can utilize from external device (ED) (for example, cloud, air traffic control system, nothing
People's aircraft, other geography fence devices etc.) information update the instruction.In some cases, to the change of indicant
The data from one or more external device (ED)s can be associated with.In one example, air traffic control system can order geography fence
Device changes indicant.In another example, another external device (ED), such as unmanned vehicle, other geography fence devices or ground
The remote control of fence apparatus is managed, instruction can be provided to geography fence device to change indicant.Indicant can change characteristic.
Characteristic be able to can be detected by unmanned vehicle.For example, for visual indicia, changing for characteristic can include indicant
The change of visual appearance.In another example, for acoustical signal, the change of characteristic can include the detectable sound of indicant
The change of feature.For wireless signal, characteristic changes the change that can include the information by indicant transmission.
For example, indicant can be with periodic variation.In one example, indicant can change per hour.Another
In example, indicant can change daily.Geography fence device can have the machine that can allow the geography fence device record time
Carry clock.
Indicant can change according to preset time table.For example, timetable can indicate that indicant should be on Monday
9:00AM from the first indicant characteristic changing be the second indicant characteristic, and then 3 on Monday:00PM is from the second indicant
Characteristic changing is the 3rd characteristic, and then the 1 of Tuesday:00AM becomes the first characteristic again from the 3rd characteristic, and then in Tuesday
10:00AM from the first characteristic changing be second characteristic etc..Timetable can be modifiable.In some cases, blank pipe system
The manipulator of system can change timetable.In another example, the owner of geography fence device or manipulator can energy
Enough change timetable.The owner and/or manipulator of geography fence device can be by handing over manually with geography fence device
Enter mutually or remotely or change timetable from the device of separation, this can cause the timetable for updating geography fence device.
In another example, indicant can change in response to the event or the situation that detect.For example, if geography encloses
Air traffic around column device reaches threshold densities, then indicant can change.If around geography fence device
Climate change (for example, begin to rain or wind speed increase), then indicant can change.Alternatively, dynamic instruction thing can be with
Change in response to the presence of the unmanned vehicle detected.For example, unmanned vehicle can be uniquely identified.Geography fence fills
Unmanned vehicle identifier can be received by putting, and the unmanned vehicle identifier uniquely identifies out from other unmanned vehicles
The unmanned vehicle.Unmanned vehicle identifier can be based on and select indicant parameter or characteristic.For example, one group of tof tube
System can depend on the identity or unmanned vehicle type of unmanned vehicle.In another example, user identifier can be based on
And select indicant parameter or characteristic.For example, one group of air traffic control can depend on the identity or user type of user.
The change of indicant can reflect the change of one group of air traffic control.For example, unmanned vehicle can be able to detect that
The change of indicant characteristic and know that another different group limitation is in place.For example, when indicant changes, unmanned vehicle
Another different group air traffic control can be used.Or unmanned vehicle can use same group of air traffic control, but described same group
Air traffic control can be applied for the different limitations of different indicants or border.
For example, if unmanned vehicle detected indicant 2940 under first group of characteristic (for example, showing " X "), institute
Stating unmanned vehicle could be aware that first group of control in place (for example, first group of border 2930a, first group of limitation).If
Unmanned vehicle detects indicant 2940 under second group of characteristic (for example, showing " O "), then the unmanned vehicle can be known
Know second group of control in place (for example, second group of border 2930b, second group of limitation).If unmanned vehicle detects finger
Show thing 2940 under the 3rd group of characteristic (for example, showing "="), then the unmanned vehicle could be aware that the 3rd group of control
(for example, the 3rd group of border 2930c, the 3rd group of limitation) in place.If unmanned vehicle detects indicant 2940 at the 4th group
Under characteristic (for example, showing "+"), then the unmanned vehicle could be aware that the 4th group of control in place (for example, the 4th group of side
Boundary 2930d, the 4th group of limitation).
Based on the local storage on unmanned vehicle machine, unmanned vehicle could be aware that different control corresponds to difference
Indicant characteristic.Local storage on unmanned vehicle machine can or can not continuously, periodically, according to the time
Table or the event in response to detecting or situation and update.In some cases, the external device (ED) such as air traffic control system can be with
Know the different control corresponding to different indicant characteristics.Unmanned vehicle can transmit the finger on detecting to external device (ED)
Show the information of thing characteristic.External device (ED) can generate one group of air traffic control and then be carried as response to unmanned vehicle
For one group of air traffic control.Any other communication construction can be used, such as other described those frameworks everywhere herein.
The aspect of the present invention can be related to a kind of geography fence device, including:One or more Memory Storage Units, its
It is configured for storing multiple indicant parameters;And dynamic instruction thing, its (1) are over time and the multiple from meeting
The first indicant parameter in indicant parameter is changed into meeting the second indicant parameter, and (2) are configured to (a) when nobody flies
During row device flight and (b) can be by the nothing when unmanned vehicle enters in the range of the predetermined geographic of the geography fence device
People's aircraft detects.A kind of method that one group of air traffic control is provided to unmanned vehicle can be provided, methods described includes:Will
Multiple indicant parameters are stored in one or more Memory Storage Units of geography fence device;And over time and
The dynamic instruction thing of the geography fence device is changed into from the first indicant parameter met in the multiple indicant parameter
Meet the second indicant parameter, wherein the dynamic instruction thing is configured for (a) when unmanned vehicle flight and (b)
It can be detected when unmanned vehicle enters in the range of the predetermined geographic of the geography fence device by the unmanned vehicle.
As it was noted above, indicant can be dynamic instruction thing.Dynamic instruction thing can have one or more parameter/spies
Property.In some embodiments, dynamic instruction thing can change the visual indicia of outward appearance over time.Visual indicia
First outward appearance can be based on the first indicant parameter and generate, and the of the visual indicia different from the first outward appearance of visual indicia
Two outward appearances can be based on the second indicant parameter and generate.In another example, dynamic instruction thing can be over time and
Change the wireless signal of characteristic.First characteristic of wireless signal can be based on the first indicant parameter and generate, and be different from nothing
Second characteristic of the wireless signal of the first characteristic of line signal can be based on the second indicant parameter and generate.
Dynamic instruction thing can uniquely identify out geography fence device and by the geography fence device and other ground
Reason fence apparatus distinguishes.For example, different geography fence devices can have different indicants.Different dynamic instruction things
Can be with different from each other.So when unmanned vehicle detects dynamic instruction thing, the unmanned vehicle can not only know
One group of air traffic control in place under the conditions of described, and know the identity of geography fence device.In other embodiments, indicate
Thing is without being unique for each geography fence device.In some cases, same type of geography fence can be directed to fill
Put and identical indicant is provided.Indicant can be unique for geography fence type of device.When unmanned vehicle detects
During to dynamic instruction thing, the unmanned vehicle can not only know that one group of air traffic control is in place under the described conditions, Er Qiezhi
Know the type of geography fence device.In other cases, indicant is without being unique for device.It is different types of differently
Reason fence apparatus can show identical indicant.Indicant can reflect one group of tof tube corresponding to the indicant
System, and unmanned vehicle need not uniquely identify geography fence device or geography fence type of device.
Dynamic instruction thing can indicate first group of air traffic control when meeting the first indicant parameter, and can be with
Second group of air traffic control is indicated when meeting the second indicant parameter.As it was noted above, can be in unmanned vehicle system
One group of air traffic control is generated and/or stored at any device in system.Any combinations of communication can occur to allow nobody
Aircraft operates according to one group of air traffic control.In some instances, first group of air traffic control and second group of air traffic control
It can be stored on unmanned vehicle machine, first group of air traffic control and second group of air traffic control can be stored in unmanned vehicle machine
On outer air traffic control system, or first group of air traffic control and second group of air traffic control can be stored on geography fence device.
Geography fence is overlapping and priority
Figure 30 shows that the scene of unmanned vehicle can be provided in the overlapping area of multiple geography fence devices.Can be
Multiple geography fence device 3010a, 3010b are provided in environment.The geography fence device can have corresponding border
3020a、3020b.One or more unmanned vehicles can be provided in environment.
Unmanned vehicle 3030d can be positioned at the first geography fence device 3010a's and the second geography fence device 3010b
Outside border.Unmanned vehicle can be alternatively in one group from the first geography fence device or the second geography fence device
Under limitation.Unmanned vehicle can freely operate in environment, without one group of flight of application to the unmanned vehicle
Control.
Unmanned vehicle 3030a can be located within the first geography fence device 3010a border and the second geography fence
Outside device 3010b border.Unmanned vehicle can be under one group of limitation from the first geography fence device without coming
From under one group of limitation of the second geography fence device.Unmanned vehicle can observe associated with the first geography fence device the
One group of air traffic control and operate.
Unmanned vehicle 3030c can be located within the second geography fence device 3010b border and the first geography fence
Outside device 3010a border.Unmanned vehicle can be under one group of limitation from the second geography fence device without coming
From under one group of limitation of the first geography fence device.Unmanned vehicle can observe associated with the second geography fence device the
Two groups of air traffic control and operate.
Unmanned vehicle 3030d can be positioned at the first geography fence device 3010a's and the second geography fence device 3010b
Within border.Unmanned vehicle can be under one group of air traffic control.Can be that unmanned vehicle falls in multiple geography fence devices
In the range of different possibilities is provided.Any possibility when describing overlapping multiple areas goes for this.
For example, the one or more areas provided by different geographical fence apparatus can be with overlapping.For example, the first geography fence fills
The firstth area in first group of border 3020a put can be with second in second group of border 3020b of the second geography fence device
Area overlapping.
When multiple area overlappings, the rule from multiple areas can be held in place.For example, with the first geography fence device phase
The first group of air traffic control and the second group air traffic control associated with the second geography fence device of association can be in overlay regions
It is held in place.In some cases, as long as the rule from multiple areas does not conflict with one another can and is held in place.For example, work as nothing
When people's aircraft is located in the firstth area, the first geography fence device can not allow the use of unmanned vehicle payload.When
When unmanned vehicle is located in the secondth area, the second geography fence device can not allow the use that unmanned vehicle communicates.Work as nothing
When people's aircraft 3030d is located in Liang Ge areas, the unmanned vehicle, which can be not allowed to operate the unmanned vehicle, effectively to be carried
Lotus and it can be not allowed to use communication unit.
If conflict between rule be present, various rule responses can be applied.For example, restricted highest can be applied
One group of rule.For example, if the firstth area requires that unmanned vehicle flies below 400 feet of height, and the secondth area requires nothing
People's aircraft flies below 200 feet of height, then, can be in overlay region when unmanned vehicle is located within overlay region
Using the rule on being flown below 200 feet of height.This can include being mixed and matched one group of rule to form limitation
One group of highest of property.If for example, the firstth area require unmanned vehicle flown more than 100 feet and below 400 feet,
And the secondth area requires that unmanned vehicle flies more than 50 feet and below 200 feet, then when unmanned vehicle is positioned at weight
Folded Qu Zhongshi, it can use the flight lower limit from the firstth area and the flight upper limit from the secondth area, with 100 feet with
Flown between 200 feet.
In another case, rank can be provided for the area.It can be provided in the rank one or more preferential
Grade.The geography fence device of (for example, rank is relatively low) relatively low compared to priority level, priority level it is higher (for example, rank compared with
It is high) geography fence device can have dominant rule, regardless of whether the geography fence device phase higher with priority
Whether the rule of association has more or less limitations for the rule that priority lower ground manages fence apparatus.Can
To be pre-selected or pre-enter the priority level of geography fence device.In some cases, there is provided for one group of the area
The user of rule can indicate which geography fence device is higher than other geography fence devices in priority level.In some feelings
Under condition, the rank for the geography fence device can be pre-selected in the manufacturer of geography fence device.What is be pre-selected is excellent
First level can by or can not be modified.In other cases, the owner of geography fence device or manipulator can input
For the tier levels of the geography fence device.The owner or manipulator of geography fence device can change geography and enclose
Column assembly first grade.In some cases, for geography fence device priority level can by such as air traffic control system, one
Or the external device (ED) such as multiple unmanned vehicles or other geography fence devices determines.In some cases, the manipulation of air traffic control system
Person can check the information on multiple geography fence devices and input or adjust the priority level of geography fence device.
In some embodiments, some priority levels can be authorized by administrative area.For example, some administrative areas can require political affairs
Mansion facility or the geography fence device of emergency service have higher priority scheduling than the geography fence device that individual possesses or operated
Level.
In a realization of one group of rule that unmanned vehicle, the priority in for overlay region are driven, the firstth area
It can require that unmanned vehicle is flown below 400 feet and payload is closed.Secondth area can require unmanned vehicle
Fly below 200 feet and limited without payload.If the geography fence that the firstth area can be higher with priority
Device is associated, then can apply the rule from the firstth area, without applying any rule from the secondth area.For example, nobody
Aircraft can fly below 400 feet and close payload.If the secondth area geography higher with priority encloses
Column device is associated, then can apply the rule from the secondth area, without applying any rule from the firstth area.For example, nothing
People's aircraft can fly below 200 feet and be limited without any payload.
In some cases, when multiple area overlappings, multigroup air traffic control can be provided.Unmanned vehicle can be provided can
The one group of main air traffic control observed.As it was noted above, one group of main air traffic control is in first group of air traffic control and
Two groups of air traffic control can include when not conflicting all both, can be between first group of air traffic control and second group of air traffic control
Merge the higher one group of air traffic control of restrictive, first group of air traffic control and the can be associated with by restricted higher mode
Whole both aspects of two groups of air traffic control, or can be associated with the geography fence device higher with priority it is associated one
Group air traffic control.
One aspect of the present invention can include a kind of method for operating unmanned vehicle, and methods described includes:Determine institute
State the position of unmanned vehicle;Multiple geography fence devices are identified, wherein each geography fence device is indicated for covering institute
State one group of air traffic control of the unmanned vehicle in the region of the position of unmanned vehicle;By means of one or more processors,
The one group of main air traffic control to be followed the unmanned vehicle carries out priority ranking, and one group of main air traffic control is
Selected from multigroup air traffic control of the multiple geography fence device;And grasped according to one group of main air traffic control
Make the unmanned vehicle.Similarly, a kind of the non-transient of programmed instruction for including and being used for operating unmanned vehicle can be provided
Computer-readable medium, the computer-readable medium include:For the programmed instruction for the position for determining the unmanned vehicle;
For identifying the programmed instruction of multiple geography fence devices, wherein each geography fence device indicate for cover it is described nobody
One group of air traffic control of the unmanned vehicle in the region of the position of aircraft;And for follow the unmanned vehicle
One group of main air traffic control carry out priority ranking with allow to be operated according to one group of main air traffic control it is described nobody
The programmed instruction of aircraft, one group of main air traffic control are from multigroup air traffic control of the multiple geography fence device
Selection.
In addition, a kind of unmanned vehicle air traffic control prioritization system can include:One or more processors, its
Either individually or collectively it is configured for:Determine the position of the unmanned vehicle;Multiple geography fence devices are identified, wherein
Each geography fence device indicates one group of the unmanned vehicle in the region of the position for covering the unmanned vehicle
Air traffic control;And the one group of main air traffic control progress priority ranking to be followed the unmanned vehicle, described one group
Main air traffic control is selected from multigroup air traffic control of the multiple geography fence device, to allow according to described one group
Main air traffic control operates the unmanned vehicle.The system can also include one or more communication modules, wherein institute
State one or more processors and be operably coupled to one or more of communication modules.
Figure 31 shows the example of the different control for different geographical fence apparatus according to one aspect of the invention.It is multiple
Geography fence device 3110a, 3110b, 3110c can have priority level and/or one or more groups of control.Described one group
Air traffic control can include one or more measurements.One or more control values can be related to one or more of measurements
Connection.One example of measurement can include a type of control.For example, the first measurement goes for the limitation of height lower limit,
Second measurement goes for payload operation limitation, and the 3rd measurement goes for radio communication limitation, and fourth amount can
To be limited suitable for battery capacity, the 5th measurement goes for rate limitation, and the 6th measurement goes for largest item and taken
Band weight etc..
In some embodiments, geography fence device can have different priority levels.Any number can be provided
Priority level.For example, can provide it is one or more, two or more, three or more, four or more, five
It is individual or more, six or more, seven or more, eight or more, nine or more, ten or more,
15 or more, 20 or more, 25 or more, 30 or more, 40 or more, 50 or more
Individual or 100 or more priority levels.Priority level can be qualitatively or quantitative.For example, priority level can divide
Into low precedence, medium priority grade and high precedence.Geography fence device with high precedence can be in rank
It is upper to be higher than the geography fence device with medium priority grade.Any sorting technique can be provided for priority level.For example, can be with
Priority level A, priority level B, priority level C etc. are provided.In some cases, priority level can have numerical value.For example, ground
Reason fence apparatus A 3110a can have priority level 98, and geography fence device B 3110b can have priority level 17, with
And geography fence device C 3110c can have priority level 54.In some cases, the priority level with higher numerical value can
With higher in rank.
Multiple geography fence devices can have different priority levels, and be enclosed from the geography with limit priority
One group of air traffic control of column device can be chosen as one group of main air traffic control.For example, if unmanned vehicle is located at geography fence
In the area of device A, B and C overlay region, then the unmanned vehicle can have one group of main air traffic control, and described group flies
Row control uses the control associated with geography fence device A, because geography fence device A has highest priority level.Such as
Fruit unmanned vehicle is located in the area of geography fence device B and C overlay region, then the unmanned vehicle can have and use
One group of air traffic control of the control associated with geography fence device C, because geography fence device C has than geography fence device B
There is higher priority level.Therefore, in the scene, one group of main air traffic control of unmanned vehicle can include pin
To measuring A control AVAL3, the control BVAL3 for measuring B, the control EVAL3 for measuring E and the pipe for measuring F
FVAL3 processed.In some cases, different geography fence devices can have identical priority level.If unmanned vehicle
Fall priority level identical geography fence device it is overlapping in, then can determine to be directed to unmanned vehicle using other technologies
One group of main air traffic control.It is, for example, possible to use other described any other examples everywhere herein.
In other cases, one group of main air traffic control can include the most stringent of pipe selected from multigroup air traffic control
System.For example, if unmanned vehicle is located in the area of geography fence device A, B and C overlay region, for each measurement,
Can from each geography fence device selectional restriction highest value.For example, for measuring A, AVAL1, AVAL2 can be selected
Or restricted highest value in AVAL3.Limited for example, if measurement A is height lower limit, and AVAL1=400 feet, AVAL2
=250 feet and AVAL3=300 feet, then AVAL1 can be selected, because AVAL1 is provided under restricted highest height
Limit.For measuring B, restricted highest value in BVAL1 or BVAL3 can be selected.Because geography fence device does not have for measurement B
There are any restrictions, then geography fence device B has been restricted minimum.If measurement B is payload operation limitation, and
BVAL1=can make payload be powered but can not any data for arriving of store collected, and BVAL3=can not make effectively
Load is powered, then BVAL3 can be selected, because BVAL3 provides restricted higher payload and used.For measuring D, ground
Reason fence apparatus A and geography fence device C does not have any restrictions.Therefore, for measurement D, DVAL2 can be selected, because
It is the restricted highest of acquiescence.For each measurement, selectional restriction highest can be measured from geography fence device.
In other cases, one group of main air traffic control can be included from the ground with overall most stringent of air traffic control
Manage the control of fence apparatus.If generally speaking, geography fence device C is compared to geography fence device A and B and with most strict
Control, then described one group mainly row control can include geography fence device C control.Even if some of A and B measurements compared with
To be strict, but if geography fence device is integrally tightened up, then geographical fence apparatus D can be selected.
One group of main air traffic control can include the air traffic control from one group of single air traffic control.For example, one group of master
Air traffic control is wanted to include being only from geography fence device A control, be only from geography fence device B control or only come
From geography fence device C control.One group of main air traffic control includes the air traffic control from multigroup air traffic control.For example, one
The main air traffic control of group can include two or more the air traffic control in geography fence device A, B and C.For not
Same measurement, can select the value from different geographical fence apparatus.
In some embodiments, can be based on unmanned vehicle identity (for example, unmanned vehicle identifier or nobody fly
Row device type) and priority ranking is carried out to one group of main air traffic control.Unmanned vehicle identifier can be received.Unmanned flight
Device identifier can uniquely identify out the unmanned vehicle from other unmanned vehicles.One group of main air traffic control can be with
Based on unique unmanned vehicle identity.For example, which group geography fence device control is unmanned vehicle identity can be determined using,
Or which combination using geography fence device control.Which technology is unmanned vehicle identity can be determined using to determine
State one group of main air traffic control.One group of main air traffic control can be based on unmanned vehicle type.For example, unmanned vehicle
Type can determine which combination using which group geography fence device control, or using geography fence device control.Nobody
Type of aircraft can determine which technology to determine one group of main air traffic control using.
In some embodiments, can be based on user identity (for example, user identifier or user type) and to one group
Main air traffic control carries out priority ranking.User identifier can be received.User identifier can be unique from other users
Ground identifies the user.One group of main air traffic control can be based on unique user identity.For example, user identity can determine
Which organizes geography fence device control, or which combination using geography fence device control using.User identity can determine
Which technology to determine one group of main air traffic control using.One group of main air traffic control can be based on user type.
For example, user type can determine using which group geography fence device control, or using geography fence device control which
Combination.User type can determine which technology to determine one group of main air traffic control using.
Can be static geographical fence apparatus with overlapping regional multiple geography fence devices.Or they can be wrapped
Include one or more mobile geographical fence apparatus.When the geographical fence apparatus of movement meets static geographical fence apparatus, Ke Yichuan
Build overlapping area.When static geographical fence apparatus have can over time and change border when, can create overlappingly
Area can make its disappearance.
Mobile geography fence
Geography fence device can be static or move.In some cases, geography fence device may remain in
At same position.In some cases, unless mobile by individual, otherwise geography fence device may remain at same position.
Substantially stationary geography fence device can be positioned in environment and can not be self-propelled.Static geography fence dress
Static structures can be fixed to or be supported by it by putting.User manually can move static geographical fence apparatus from first position
Move to the second place.
Geography fence device can be mobile.Geography fence device can move between position and position.Geography encloses
Column device can move in the case of without personal mobile geographical fence apparatus.Mobile geographical fence apparatus can be self-propelled
Formula.Mobile geographical fence apparatus can be fixed to the loose impediments such as apparatus of transport or be supported by it.It is mobile geographical
Fence apparatus can have one or more propulsion units thereon, and the propulsion unit can allow to move geographical fence apparatus
Move around in the environment.Mobile geographical fence apparatus can be attached to loose impediment or be supported by it, described removable
Object can have one or more propulsion units, and the propulsion unit can allow the loose impediment with movably
Manage and moved around in the environment of fence apparatus.
Figure 32 shows the example of the mobile geographical fence apparatus according to embodiment of the present invention.Mobile geographical fence apparatus can
To be unmanned vehicle 3210a, 3210b.Mobile geographical fence apparatus can be aircraft, the apparatus of transport based on ground, base
Apparatus of transport in water or apparatus of transport or any combination of them based on space.Unmanned vehicle only passes through the side of example
Formula provides, and any description to unmanned vehicle goes for any other apparatus of transport or loose impediment herein.
Geography fence device 3210a, 3210b can have can over time and change position.Can be movably
Distance d is provided between reason fence apparatus.Mobile geographical fence apparatus can have corresponding border 3220a, 3220b.The side
Boundary can keep constant or can change over time.The border can be in response to such as other are described everywhere herein
The condition that detects of one or more and change.
Mobile geographical fence apparatus can send radio communication.Radio communication can be may include on mobile geography fence
The message of the information of device.Identification information, such as geography fence device identification or geography fence type of device can be sent.Disappear
Breath can include information signature.Message can include geography fence device keys information.Message can be included for mobile geographical
The positional information of fence apparatus.For example, message can include the world coordinates for geography fence device.Mobile geography fence dress
The GPS unit or other locators for the position that can provide the geographical fence apparatus of movement can be had by putting.Message can wrap
Include the flight plan on geography fence device or the information in navigation channel.Message can include temporal information, such as send message
Time.The time can be provided according to the clock on the geographical fence apparatus of movement.Message can include flight control information.Example
Such as, message can include the information on the flight orders received and/or the flight orders being carrying out.
When the geographical fence apparatus of movement is unmanned vehicle, message can be sent and received each other.For example, when the first shifting
When dynamic geography fence device 3210a is close to the second movement geographical fence apparatus 3210b, each moving geographical fence apparatus can send out
Go out the message with any information described herein.Unmanned vehicle can based on transmitted message come identify each other and/
Or detection.Or other detections or identification technology can be used, such as other described those technologies everywhere herein.
The message from unmanned vehicle can be continuously sent out.For example, it can continue to broadcast the message.Unmanned vehicle
Message can be sent, regardless of whether they have been detected by each other.Can regularly (for example, with rule or it is irregular when
Between be spaced), the message from unmanned vehicle sent according to timetable or the event in response to detecting or situation.Example
Such as, when unmanned vehicle detects the presence of other unmanned vehicles, message can be sent.In another example, when by
During air traffic control system order, unmanned vehicle can send message.
In some cases, geography fence radius can be included for the message of unmanned vehicle.Geography fence radius can
With relevant with the mobility or task of corresponding unmanned vehicle., can be with for example, if unmanned vehicle is more can be motor-driven
Less radius is provided.When unmanned vehicle be compared with can not be motor-driven when, larger radius can be provided.
For example, the first unmanned vehicle 3210a can broadcast the first geography fence radius (for example, RA).Alternatively, second
Unmanned vehicle 3210b can broadcast the second geography fence radius (for example, RB).When the second unmanned vehicle from first nobody fly
When row device receives radius, the distance between the first unmanned vehicle and the second unmanned vehicle d can be calculated.It is if described
Distance d is less than RA or less than RB, then and the second unmanned vehicle can carry out navigation channel amendment or hover on the spot, meanwhile, it can be with
It is possible to inform that the first unmanned vehicle has collision.It that case, the first unmanned vehicle can carry out navigation channel amendment or
Hover on the spot.
Similarly, in flight course, the second unmanned vehicle can broadcast simultaneously the second geography fence radius (for example,
RB).When the first unmanned vehicle receives radius from the second unmanned vehicle, the first unmanned vehicle and can be calculated
The distance between two unmanned vehicles d.If the distance d is less than RA or less than RB, then the first unmanned vehicle can enter
Row navigation channel is corrected or hovered on the spot, meanwhile, it can inform that the second unmanned vehicle has the possibility of collision.In that situation
Under, the second unmanned vehicle can carry out navigation channel amendment or hover on the spot.
When two unmanned vehicle broadcast messages, two unmanned vehicles can detect the possibility of collision and carry
Corrected for navigation channel.In some cases, one in the unmanned vehicle can continue its navigation channel and another unmanned vehicle
Avoiding action is taken to avoid possible collision.In other cases, two unmanned vehicles can be taken some form of
Avoiding action is to avoid possible collision.
In some embodiments, when priority difference between unmanned vehicle be present, only described unmanned vehicle
In one can take avoiding action and another cannot.For example, the higher unmanned vehicle of priority level need not be taken
Avoiding action, and the relatively low unmanned vehicle of priority level can be forced to take avoiding action.In another example, can be on inciting somebody to action
Which it is easy to unmanned vehicle is taken avoiding action and is calculated.For example, if the first unmanned vehicle is very fast
It is fastly mobile and the second unmanned vehicle is very slowly moving, then if the second unmanned vehicle can not leave road in time
Line, then the first unmanned vehicle is carried out navigation channel amendment may be easier.In another example, if the second unmanned vehicle can
To leave route in time, then it can be made to carry out navigation channel amendment, otherwise make the first unmanned vehicle take avoiding action to spend
Take more multi-energy.
Therefore, it is possible to use unmanned vehicle, as mobile geographical fence apparatus, it can help unmanned vehicle to avoid
Collision.For collision avoidance application, unmanned vehicle can limit the side that other unmanned vehicles enter the unmanned vehicle
In boundary.For example, the first unmanned vehicle can prevent other unmanned vehicles such as second unmanned vehicle from entering the first nothing
The border of people's aircraft.Similarly, the second unmanned vehicle can prevent the first unmanned vehicle from entering the second unmanned vehicle
Border.If a border for entering other unmanned vehicles in the unmanned vehicle, can occur to help
Prevent the flight responsive measures of collision.
Similar collision avoidance application can also be provided for static mobile geographical fence apparatus.If for example, the first ground
Reason fence apparatus is mounted in the static geographical fence apparatus on stationary body (building such as on ground), then it can be right
Prevent the second geographical fence apparatus (for example, unmanned vehicle) of movement from bumping against and the quiet of the first geography fence device is installed thereon
State object is helpful.Geography fence device can provide in virtual " field of force ", and " field of force " can prevent unwarranted
Unmanned vehicle or other geographical fence apparatus of movement enter in border.
In other embodiments, other kinds of limitation can be provided in the border of geography fence device.For example, can
To provide effective load operation limitation.In one example, two unmanned vehicles can be traveling at, each unmanned vehicle
With the camera that image can be caught corresponding to their own.First unmanned vehicle can have and not allow other in border
Unmanned vehicle operates the flight restriction of camera.Second unmanned vehicle can have other unmanned vehicles allowed in border
Operation camera but the flight restriction for not allowing record image.Therefore, when the second unmanned vehicle enters the first unmanned vehicle
During border, second unmanned vehicle may have to power off its camera., can be with if it can not power off its camera
It is forced to take avoiding action to avoid the border of the first unmanned vehicle.When the first unmanned vehicle enters the second unmanned flight
During the border of device, it can keep its camera opening but must stop recording.Similarly, can if it is unable to stop recording
To force it to take avoiding action.If it is desire to the activity of geography fence device is not recorded or caught on camera, then it is this
The limitation of type can be useful.For example, when unmanned vehicle undergoes task, it may be undesirable to other unmanned flights
Device catches the image of the unmanned vehicle.The limitation of any other type can be used, such as other are described everywhere herein
Those limitation.
The aspect of the present invention can include a kind of method for identifying mobile geographical fence apparatus, and methods described includes:In nothing
The signal from the geographical fence apparatus of movement is received at people's aircraft, the signal designation goes out (1) described mobile geography fence dress
The position put and one or more geography fence borders of (2) described geographical fence apparatus of movement;Calculate the unmanned vehicle
The distance between described geographical fence apparatus of movement;Based on the distance, determine whether the unmanned vehicle falls described
In one or more of geography fence borders of mobile geographical fence apparatus;And when the unmanned vehicle falls in the shifting
When in one or more of geography fence borders of dynamic geography fence device, carried based on the geographical fence apparatus of movement
The unmanned vehicle is operated under the one group of air traffic control supplied.
Unmanned vehicle can include:Communication unit, it is configured for receiving from the geographical fence apparatus of movement
Signal, the signal designation go out the position and the one of (2) described geographical fence apparatus of movement of (1) described geographical fence apparatus of movement
Individual or multiple geography fence borders;And one or more processors, it is operably coupled to the communication unit and single
Solely or jointly it is configured for:Calculate the distance between the unmanned vehicle and the geographical fence apparatus of movement;
Based on the distance, determine whether the unmanned vehicle falls in the one or more of of the geographical fence apparatus of movement
Manage in fence boundary;And generation signal, to fall at one of the geographical fence apparatus of movement when the unmanned vehicle or
Realize the unmanned vehicle in one group provided based on the geographical fence apparatus of movement when in multiple geography fence borders
Operation under air traffic control.
One or more of geography fence borders of the geographical fence apparatus of movement can be with geography fence device
Centered on, have the first radius circular boundary.The distance between unmanned vehicle and mobile geographical fence apparatus can be with
First radius compares.Unmanned vehicle can also be the geography fence dress with second group of one or more geography fence border
Put.Second group of one or more geography fence border of unmanned vehicle can be it is centered on unmanned vehicle,
Circular boundary with the second radius.Unmanned vehicle can be with the second radius phase with moving the distance between geographical fence apparatus
Compare.Mobile geographical fence apparatus can be another unmanned vehicle.
Figure 33 shows the example of the mobile geographical fence apparatus closer to each other according to embodiment of the present invention.First movement
Geography fence device 3310a can be close to the second geographical fence apparatus 3310b of movement.The second geographical fence apparatus of movement can
With close to the first geographical fence apparatus of movement.Geography fence device can be with closer to each other.Mobile geographical fence apparatus can be with
With corresponding one group of border 3320a, 3320b.Mobile geographical fence apparatus can be along corresponding track 3330a, 3330b
It is mobile.
In some embodiments, the track and/or border of mobile geographical fence apparatus can be analyzed, to determine movably
Whether reason fence apparatus would be possible to intrude in mutual border.In some cases, mobile geographical fence apparatus can be
It is quick mobile, it is possible to it is intended that whether device is positioned at the determination on the navigation channel of collision in early days.The track can be analyzed
With the Future Positions of the mobile geographical fence apparatus of prediction.The border can be analyzed to determine to move geographical fence apparatus to keep away
Allow each other and the berth having will be may require that.For example, larger border may cause to move geographical fence apparatus needs each other
Keep wider berth.Less border may cause to allow to move geographical fence apparatus keeps less berth each other.
In some cases, track can be provided to approach directly with one another to move geographical fence apparatus.Or one or
Multiple tracks can cancel.In terms of determining whether to take avoiding action, it is also contemplated that the speed of mobile geographical fence apparatus
And/or acceleration.Also, determine whether any geographical fence apparatus of movement needs to take avoiding action, which movement geography to enclose
Column device will need to take whether avoiding action or two geographical fence apparatus of movement will need to take avoiding action.It is similar
Ground, it may be determined that avoiding action type (such as, if it is geographical to bear away, slow down, accelerate, hover or change any other
Fence apparatus operating parameter).
Figure 34 shows another example of the mobile geographical fence apparatus according to embodiment of the present invention.Mobile geography fence dress
It can be loose impediment to put 3410, or can be fixed to loose impediment 3420 or be supported by it.Loose impediment can be with
It is apparatus of transport, such as apparatus of transport based on ground, the apparatus of transport based on water, the apparatus of transport based on air or is based on
The apparatus of transport in space.Mobile geographical fence apparatus can have border 3430.Border can be with the geographical fence apparatus of movement
It is mobile.Unmanned vehicle 3440 can be near geography fence device.
Geography fence device 3410 can have any one group of associated air traffic control for unmanned vehicle 3440.
In one example, air traffic control can require that unmanned vehicle is maintained at the geography fence border of mobile geographical fence apparatus
In 3430.Unmanned vehicle can the free flight in the spatial domain limited by geography fence border.When the geographical fence apparatus of movement
When mobile, border can enclose device with the mobile geography and move.Unmanned vehicle can be then also with the movement
Geography fence device and move.It is this to be limited in it can be desirable to it have that unmanned vehicle, which is followed in the scene of loose impediment,
.For example, loose impediment can be the apparatus of transport based on ground, and it can be desirable to unmanned vehicle based on ground
Apparatus of transport above fly and catch the image of surrounding environment, described image may be displayed on the apparatus of transport based on ground
On.Unmanned vehicle can be maintained at described based on ground in the case of without unmanned vehicle described in user's active operation
Near apparatus of transport.Unmanned vehicle may remain in apparatus of transport and can follow in the border of movement and therefore institute
State apparatus of transport.
In another example, limitation can be such that unmanned vehicle is maintained at outside border.Limitation can prevent unmanned flight
Device bumps against the apparatus of transport based on ground or collided therewith.Even if unmanned vehicle is just manually operated by user, but if with
Family provides the instruction that unmanned vehicle will be made to bump against apparatus of transport, then the unmanned vehicle, which can be taken, can prevent nobody from flying
Row device hits the flight responsive measures of apparatus of transport.This is for may otherwise be not intended to cause the nothing lacked experience crashed
People's aircraft user or the unmanned vehicle user that may always strive to hit the malice of apparatus of transport intentionally can be useful
's.Mobile geographical fence apparatus can protect object is remote unmanned vehicle is hit mobile geography fence
Malicious user near device.
One additional example can be limited for payload.For example, enclosed when unmanned vehicle is located at mobile geography
When in the border of column device, the unmanned vehicle can be not allowed to catch ambient image.Even if when mobile geographical fence apparatus
When being moved around in environment, the unmanned vehicle can also can not catch mobile geographical fence apparatus and loose impediment
Image.If it is desire to unmanned vehicle is prevented to collect on the geographical fence apparatus of movement or the data of loose impediment (such as
View data), then this can be useful.
In another example, when unmanned vehicle is located in border, limitation can prevent the channel radio of unmanned vehicle
Letter.In some instances, limitation can allow radio communication but can prevent to may interfere with loose impediment and/or geography fence dress
The communication for the function of putting.When geographical fence apparatus moves, unmanned vehicle can not use may interfere with geography and enclose
The radio communication of column device and/or the radio communication of loose impediment.This is removable for preventing random unmanned vehicle from entering
Animal body is nearby and to disturb loose impediment and/or the communication of mobile geographical fence apparatus can be useful.
Limitation such as other described any other types everywhere herein goes for moving geographical fence apparatus.
User interface
Information on one or more geography fence devices can be shown on the display apparatus.Described device can be can
The user terminal checked by user.User terminal can function as that one or more operational orders can be sent to unmanned vehicle
Remote control.Remote control may be configured for receiving to realize user's input of the operation of unmanned vehicle.Can be by user's control
The example of unmanned vehicle operation can include flight, payload operation, payload positioning, carrier operation, sensor behaviour
Work, radio communication, navigation, electricity use, any other operation of article delivery or unmanned vehicle.For example, user can be through
The flight of unmanned vehicle is controlled by remote control.User terminal can receive data from unmanned vehicle.Unmanned vehicle can
To catch data using one or more sensors (such as camera).The image from camera can be provided to user terminal,
Or the data from any other sensor can be provided to user terminal.User terminal can function as can be to geography fence
Device sends the remote control of the function of one or more order or change geography fence devices.Described device can be that geography encloses
Display device with column device sheet.Geography fence device can show the ground on the geography fence device and any surrounding
Manage the information of fence apparatus.Described device can be the display device of the manipulator (for example, manager) of air traffic control system.The dress
Putting can be judicial entity user (for example, government work person, employee of government organs) and/or emergency service user (for example, alert
Member etc.) display device.Described device can be can be seen by any other individual being related in unmanned vehicle system it is aobvious
Showing device.
Display device can include screen or other kinds of display.Screen can be lcd screen, CRT screen, etc. from
Sub-screen, LED screen, touch-screen and/or it can be shown using any other technology as is generally known in the art or aobvious later
The information shown.
Figure 35 shows the use for showing the information on one or more geography fence devices according to embodiment of the present invention
The example at family interface.Display device 3510 can have screen or other the part of user interface 3520, the user can be shown
Interface 3520 can show the information on one or more geography fence devices.In one example, it can show that geography encloses
Column device 3530a, 3530b, 3530c map.User interface can show the position of geographical fence apparatus relative to each other.With
Family interface can show corresponding border 3540a, 3540b, 3540c for geography fence device.Unmanned vehicle can be shown
3550 relative to geography fence device position.
Display device can be remote-control device, and it can be used for allowing user to check geography fence device information.Can be from
Collect the information of the position on geography fence device in one or more geography fence devices.Remote-control device can be directly from one
Individual or multiple geography fence device receive informations.For example, geography fence device can be transmitted on the geography fence device
The signal of position.Or the information from one or more geography fence devices can be provided to display device indirectly.At one
In example, air traffic control system, the other parts of Verification System or any other system can collect the letter on geography fence device
Breath.Closed for example, air traffic control system can receive the information on the position of geography fence device and can be transmitted to remote-control device
In the information of geography fence device.
Geography fence device can to remote-control device or to another device or system (such as air traffic control system) transmission on
The information of geography fence border.Air traffic control system can from geography fence device receive on geography fence border information and can
To transmit described information to remote-control device.In other embodiments, geography fence device can only transmission of location information, it is and empty
Guard system or other systems can provide the information on border.For example, geography fence device can transmit ground to air traffic control system
Fence apparatus position is managed, and air traffic control system can determine the border for the geography fence device.Air traffic control system can be then
The information together with position information on border is sent to remote-control device.In some embodiments, air traffic control system or other systems
Can the position based on geography fence device and generate border.The position on border can be determined on the position of geography fence device
Put.Air traffic control system is it is determined that can contemplate other factors during geography fence border, such as on the nothing near geography fence device
The information of people's aircraft and/or user, environmental condition, timing and/or any other factor.
In some embodiments, remote-control device can be the remote control of unmanned vehicle.Just by remote-control device control
Unmanned vehicle can be located near one or more geography fence devices.Air traffic control system or geography fence device can detect
It is located to unmanned vehicle near geography fence device.Unmanned vehicle can determine that it is located at the attached of geography fence device
Closely.Geography fence border can be generated based on the information on unmanned vehicle or the user for operating the unmanned vehicle.
Geography fence border can be generated at air traffic control system, geography fence device, unmanned vehicle and/or remote control.Remote-control device
The information on the border on geography fence device can be shown, described information may or may not be for unmanned flight's utensil
Body customization.
In one example, border is shown, the border can be to check that the remote-control device on the border customizes.Can
With the information based on the unmanned vehicle on that can be communicated with remote-control device (for example, unmanned vehicle identifier, unmanned flight
The activity of device type, unmanned vehicle) and customize border.One or more operations of unmanned vehicle can be filled with origin from long-range
The order control put.Unmanned vehicle can be sent on the letter for the data collected by the unmanned vehicle to remote-control device
Breath.For example, the image captured by the image capture device on unmanned vehicle machine can be sent downwards to remote-control device.
When customizing border for remote-control device, other remote-control devices can or can not be seen and remote-control device identical
Border.For example, the first remote-control device can communicate with the first unmanned vehicle, first unmanned vehicle can be located at one
Near individual or multiple geography fence devices.First remote-control device can show the position and/or side on geography fence device
The information on boundary.The position of the first unmanned vehicle can be shown on position and/or the border of geography fence device.Second is remote
Range device can communicate with the second unmanned vehicle, and second unmanned vehicle can be located at one or more geography fences
Near device.Second remote-control device can show the information of the position and/or border on geography fence device.Can be on
The position and/or border of geography fence device and show the position of the second unmanned vehicle.In some cases, enclosed on geography
The information of the position of column device can be consistent between the first remote-control device and the second remote-control device.For example, for
The same geography fence device all shown on one remote-control device and the second remote-control device, can provide same position.On for
The information on the border of geography fence device may or may not be one between the first remote-control device and the second remote-control device
Cause.For example, border can be rendered as identical on the first remote-control device and the second remote-control device.Or border is first
It can be rendered as on remote-control device and the second remote-control device different.In some cases, the border of geography fence device can be with
Changed according to the identity of unmanned vehicle.The border of geography fence device can change according to unmanned vehicle type.Cause
This, for same geography fence device, the first remote-control device and the second remote-control device can show different borders.All geography
In fence apparatus, geography fence device some, one in geography fence device or no geography fence device can be
Different borders are shown between the first remote-control device and the second remote-control device.
First remote-control device can show the position of the first unmanned vehicle, and the second remote-control device can show the second nothing
The position of people's aircraft.The position of first unmanned vehicle and the second unmanned vehicle can be with different from each other.First remote-control device
It can show or can not show the position of the second unmanned vehicle.Second remote-control device can show or can not show
The position of first unmanned vehicle.Remote-control device can show the remote-control device can corresponding to unmanned vehicle position.Far
Range device can show or can not show the position of other unmanned vehicles.
One aspect of the present invention is related to a kind of method for showing the geography fence information for unmanned vehicle, the side
Method includes:Geography fence device data are received, the data include position and (2) institute of (1) at least one geography fence device
State one or more geography fence borders of at least one geography fence device;Offer is configured for user's display information
Display;And show on the display described in position and (2) with (1) described at least one geography fence device
The map of one or more geography fence borders of at least one geography fence device.Display device can include:Communication unit,
It is configured for receiving geography fence device data, and the data include the position of (1) at least one geography fence device
(2) one or more geography fence borders of at least one geography fence device;And display, it is configured to use
In to user's display information, wherein the display shows position and (2) with (1) described at least one geography fence device
The map of one or more of geography fence borders of at least one geography fence device.
Can be with the position of the object shown on real-time update long-range displaying device.For example, can be with real-time update remote-control device
On the position of unmanned vehicle that shows.The position of unmanned vehicle can be shown at least one geography fence device.
Can continuously, periodically (for example, with rule or irregular time interval), according to timetable or in response to detecting
Event or situation and update the position of unmanned vehicle.In some cases, 15 can be less than what unmanned vehicle moved
Minute, 10 minutes, 5 minutes, 3 minutes, 2 minutes, 1 minute, 30 seconds, 15 seconds, 10 seconds, 5 seconds, 3 seconds, 2 seconds, 1 second, 0.5 second, 0.1
Position of the unmanned vehicle on screen is updated in second, 0.05 second or 0.01 second.
In some embodiments, geography fence device can be static.Without renewal or can constantly, the cycle
Property, the position of geography fence device updated according to timetable or the event in response to detecting or situation.In some feelings
Under condition, user can move static geographical fence apparatus.For example, user can pick up geography fence device and be moved to
Another location.The position of renewal may be displayed on remote-control device.
Or geography fence device can be mobile.The position of geography fence device can change.Can be with real-time update
The position of the one or more geography fence devices shown on remote display.Can be relative to each other and/or on map its
His feature and the position of one or more geography fence devices is shown.Can be continuously, periodically (for example, with rule or not
The time interval of rule), the position of geography fence device updated according to timetable or the event in response to detecting or situation
Put.In some cases, can geography fence device move less than 15 minutes, 10 minutes, 5 minutes, 3 minutes, 2 minutes, 1
Geography fence is updated in minute, 30 seconds, 15 seconds, 10 seconds, 5 seconds, 3 seconds, 2 seconds, 1 second, 0.5 second, 0.1 second, 0.05 second or 0.01 second
Position of the device on screen.
The border of geography fence device can be essentially static.Essentially static geography fence device need not be updated
The display on border.Or can continuously, periodically, according to timetable or the event in response to detecting or situation and
Update the border.
The border of geography fence device alternatively can change over time.Can be with real-time update remote display
The position on the border shown.Other features that can be relative to each other and/or on map and one or more geography fences are shown
The position on device border.Can continuously, periodically (for example, with rule or irregular time interval), in response to the time
Table or the event in response to detecting or situation and update geography fence device border.In some cases, can be in geography
Fence apparatus border change less than 15 minutes, 10 minutes, 5 minutes, 3 minutes, 2 minutes, 1 minute, 30 seconds, 15 seconds, 10 seconds, 5
The geography fence device border shown on screen is updated in second, 3 seconds, 2 seconds, 1 second, 0.5 second, 0.1 second, 0.05 second or 0.01 second.
Geography fence device border can change according to any number of factor (such as herein other everywhere described those factors)
Become.For example, environmental condition can cause the change on border.Unmanned vehicle information, user profile or timing etc. other because
Element can cause the change on border.
User interface can alternatively show a type of air traffic control applied by least one geography fence device
Visual indicator.Different types of air traffic control can be applied by geography fence device.The example of species can be included but not
Be limited to air traffic control, payload control, communication control, electricity using/management control, the control on entrained article, lead
Aviation management system, sensor control or any other control.Visual indicator can visually distinguish the flight of different type or species
Control.The example of the type of visual indicator can include but is not limited to word, numeral, symbol, icon, size, image, face
Color, pattern, highlighted or any other visual indicators for helping distinguish between different types of air traffic control.For example, it can be directed to
Different colors is provided by the different types of air traffic control that at least one geography fence device applies.For example, first is geographical
Fence apparatus or border can have the air traffic control (for example, upper height limit) for indicating the first kind the first color (for example,
It is red), and the second geography fence device or border can have the air traffic control for indicating Second Type (for example, payload
Using) the second color (for example, green).In some cases, single geography fence device can have polytype
Air traffic control.Visual indicator can indicate that covered polytype (for example, red line and green line can be shown on border
To indicate that upper height limit and payload are all in place using limiting).In some embodiments, air traffic control is applicable
Area in border can be hypographous or can be with the color for indicating air traffic control type.In some cases,
If the one or more that control is applied to outside border limits, the region outside border can be hypographous or colored.Example
Such as, unmanned vehicle can be only permitted to operate payload in one group of border of geography fence device.Ground so outside border
Area can be hypographous, show that payload is limited outside the border of geography fence device to be used.Or the ground in border
Area can be hypographous, show the control of the type in border and only allow the operation in border.
In some embodiments, unmanned vehicle can have flight path or direction.The track of unmanned vehicle or
Direction can be shown on a user interface.For example, arrow or vector can point to the direction that unmanned vehicle is traveling at.Nobody
The visual indicator of aircraft direction or track can indicate that or can not indicate unmanned vehicle speed or other shiftings
Reason element.For example, indicant can visually distinguish unmanned vehicle with higher speed or relatively low speed
Degree is advanced.In one example, can be with display speed numerical value.In another example, it is longer compared to shorter arrow or vector
Arrow or vector can be corresponding with larger speed.
The information on unmanned vehicle flight path can be shown on a user interface.It is alternatively possible to show on
The information of the past flight path of unmanned vehicle.For example, other of dotted line or path indicant can show unmanned vehicle
Where advanced to.Map can show other indicants in the course line that unmanned vehicle has stepped through or path.At some
In the case of, following flight path can be shown on a user interface.In some cases, unmanned vehicle can have predetermined
Or half predetermined flight plan.Flight plan can include the following flight path of planning.Planning can be shown on a user interface
Flight path.For example, it can show to plan other indicants in the course line advanced wherein of unmanned vehicle or path.Can be with
Change in real time or update following flight path.Can be continuously, periodically (for example, between rule or irregular time
Every), according to timetable update and/or show following flight path.In some cases, can enter to following flight path
Row change less than 15 minutes, 10 minutes, 5 minutes, 3 minutes, 2 minutes, 1 minute, 30 seconds, 15 seconds, 10 seconds, 5 seconds, 3 seconds, 2 seconds,
The following flight path shown on screen is updated in 1 second, 0.5 second, 0.1 second, 0.05 second or 0.01 second.
The priority level for geography fence device can be shown on a user interface.Visual indicator can allow to be directed to
Vision difference between the different priority levels of geography fence device.For example, the size or shape of icon can indicate that and be directed to
The priority level of geography fence device.The color of icon can indicate that the priority level for geography fence device.It is such as single
The label such as word or numerical value can be provided by geography fence device, and it can indicate that the priority level of geography fence device.One
In the case of a little, priority level can not visually be shown under normal circumstances.However, when user selects geographical fence apparatus or makes
When mouse is on geography fence device, described information can be shown.
Long-range displaying device may be configured for receiving user's input.In one example, the display device can be with
With touch-screen, the touch-screen can record user's input when user touches screen or slides screen.Described device can
With the user interaction components with any other type, such as button, mouse, control stick, trackball, touch pad, pen, inertia pass
Sensor, image capture device, motion capture device or microphone.
User inputs the operation that can influence unmanned vehicle or geography fence device.The nothing that may be influenceed by user's input
The example of people's aircraft operation can include unmanned vehicle energization or power-off, unmanned vehicle flight path, unmanned vehicle
Take off, unmanned vehicle landing, unmanned vehicle destination or way point, unmanned vehicle offline mode (for example, it is autonomous,
Semi-autonomous or manual offline mode;Or the offline mode along predefined paths, half predefined paths or real-time route).
User inputs the operation that can influence geography fence device.User inputs the position that can influence geography fence device
And/or the border of geography fence device.User's input can influence the one group air traffic control associated with geography fence device.Example
Such as, user's input can influence the one or more limitations applied by geography fence device.User's input can influence geography and enclose
The priority level of column device.
One aspect of the present invention is related to a kind of method for controlling geography fence device, and methods described includes:Receive on
The data of at least one geography fence device;There is provided display, its be configured for based on receive on it is described at least
The data of one geography fence device and geographical fence apparatus information is shown to user;Receiving, which influences at least one geography, encloses
User's input of the operation of column device;And by means of transmitter, inputted according to the user to transmit at least one described in influence
One or more signals of the operation of individual geography fence device.A kind of display device can include:Receiver, it is configured to use
In data of the reception at least one geography fence device;Display, its be configured to based on receive on it is described extremely
Lack the data of a geography fence device and geographical fence apparatus information is shown to user;One or more processors, its is independent
Ground or the user's input for being jointly configured for receiving the operation for influenceing at least one geography fence device;And hair
Emitter, it is configured for being inputted according to the user influences the operation of at least one geography fence device to transmit
One or more signals.
Figure 43 provides can receive user's input to control one or more geography fences according to embodiment of the present invention
The example of the device of device.System can include one or more remote-control devices 4310.The system can also include one or
Multiple geography fence device 4320a, 4320b, 4320c.The geography fence device can alternatively with air traffic control system 4330, recognize
Another part of card system or any other system or device communicate.Or geography fence device can be with remote-control device
Direct communication.Remote-control device can include the user interface on display 4315.User interface can be shown on geography fence
The information of device.In one example, map 4340 can show the positional information on geography fence device.Alternatively, originally
Invention can provide listings format, chart format or any other form.In some embodiments, one or more can be provided
Individual additional regional 4360.The area can include the instrument or option of the control on one or more geography fence devices.
In some cases, user directly can be interacted with user interface 4350 to control geography fence device.
In some embodiments, can be provided between geography fence device and air traffic control system or other systems it is unidirectional or
Two-way communication.For example, geography fence device can to air traffic control system provide on the geography fence device positional information or
Other information.Air traffic control system can by one or more dictation trunks to geography fence device (for example, about whether change position
The instruction put, change border, changed priority, change of flight limitation etc.).Air traffic control system or other systems can have with it is long-range
The unidirectional or two-way communication of display device.Information (for example, geography fence setting position, border) on geography fence device can
To be transmitted from air traffic control system to long-range displaying device.In some embodiments, can be provided to air traffic control system on to display
The information of one or more users input of device.For example, user can provide input to influence the operation of geography fence device,
The input can be transferred to air traffic control system, and the air traffic control system, which can transfer to transmit instruction to corresponding geography fence, to be filled
Put.In other embodiments, direct communication can be provided between geography fence device and long-range displaying device.Geography fence
Device can directly provide the information on geography fence device, and wherein at least some information may be displayed on long-range displaying device
On.Long-range displaying device can receive the operation for influenceing at least one geography fence device user input, and to influence to
The instruction of the operation of a few geography fence device can be transferred into corresponding geography fence device.
User inputs the operation that can influence geography fence device.User inputs the position that can influence geography fence device
Put.In some cases, geography fence device can be mobile geographical fence apparatus.User, which can provide, can influence geography fence
The input of the movement of device.For example, user's input can indicate that mobile geographical fence apparatus will be moved to new position.User
Input can influence to be not currently in mobile geography fence device.Or user's input can be in the motion of geography fence device
Influence the geography fence device simultaneously.User's input can indicate that destination or the way point for geography fence device.
For example, user can key in the destination for geography fence device or the coordinate of way point.In another example, user can be with
Geography fence device is clicked on map and is dragged to it from current location and it is expected destination.In another example, Yong Huke
Pick up geography fence device to be slided on map using finger and be moved to new desired locations.User's input can be with
Indicate the path for geography fence device.User can be filled using the finger of the user to depict for geography fence
The expected path put.User can with input pin to one or more parameters in geographical fence apparatus path (for example, specifying geography to enclose
Column device, which should be taken, can reach the shortest path for it is expected destination etc., designate whether any constraint for having to path, all
The architecture based on land or water that should be followed such as height limitation, no-fly zone, geography fence device).User's input can be with
For the movement of geography fence device, one or more parameters are set.For example, user's input can indicate that geography fence fills
Point-to-point speed, angular speed, translational acceleration or the angular acceleration put.Any type of maximum or minimum speed can be provided or added
Speed.
User inputs the border that can influence geography fence device.One or more ground of at least one geography fence device
Reason fence boundary can be influenceed by user's input.User inputs the size and/or shape that can influence geography fence device border.
In one example, user can key in one group of coordinate and/or geometric parameter (example on the expectation border for geography fence device
Such as, radius).User can depict desired geography fence device using the finger 4350 or pointer of the user.Describe
The border gone out can be freehand or can use one or more shape templates.User can select existing boundaries simultaneously
And border described in drag and drop is to change the size on border.User can be with the part on drag and drop border so that border extension or change border
Shape.The geography fence border information of renewal can be shown in real time.Input and show over the display for example, user can be based on
Go out the boundary information of renewal.In some cases, each geography fence device can have default boundary.Or initially, border
Can be undefined.User can change default boundary or new border is inputted for undefined border.
User's input can influence the one group air traffic control associated with geography fence device.For example, user's input can be with
Influence the one or more limitations applied by geography fence device.In some cases, user can be handed over map 4340
Mutually to input or change flight restriction.In other cases, user can be interacted with defeated with one or more areas 4360
Enter or change flight restriction.User can select the user to wish for its input or the geography fence dress of change flight restriction
Put.In some cases, user can be directed to selected geography fence device and select one from multiple available flight restrictions
Individual or multiple flight restrictions.User can input the one or more values that can be directed to air traffic control and specify.For example, user can be with
Height lower limit and maximal rate can be included by being chosen so that the flight restriction for geography fence device.User can be after
And value of the input pin to height lower limit and the value for maximal rate.In other cases, user can be from not pre-existing
Option in selected in the case of specify or generation flight restriction.In some cases, each geography fence device can be with
Associated flight restriction with acquiescence.Or initially, one group of flight restriction can be undefined.User can
Change one group of flight restriction of acquiescence or new flight restriction is inputted for undefined device.Therefore, user can energy
Enough one or more groups of air traffic control write at remote location for geography fence device.User can be from remote location
One group air traffic control of the renewal for geography fence device.User can be directed to different condition and write for geography fence
The different group air traffic control of device.For example, when unmanned vehicle runs into geography fence device, user be able to can be specified to
The unmanned vehicle of one type provides first group of air traffic control and provides second group of tof tube to the unmanned vehicle of Second Type
System.User be able to can be programmed:Will when unmanned vehicle runs into geography fence device under first group of environmental condition
First group of air traffic control is provided, and will be provided to run into the unmanned vehicle of geography fence device under second group of environmental condition
Second group of air traffic control.User can also be programmed:Will when unmanned vehicle runs into geography fence device in the very first time
First group of air traffic control can be provided, and second group will be provided to run into the unmanned vehicle of geography fence device in the second time
Air traffic control.User can write the combination of any kind of condition or condition that can produce various air traffic control.
User inputs the priority level that can influence geography fence device.For example, user can specify geography fence device
With high priority, high medium priority or low priority.User can be that device specifies priority value.As herein other everywhere
The priority of any other described type can be defined by the user.In some cases, geography fence device can have
Default priority level.Or initially, the priority level of geography fence device can be undefined.User be able to can change
Default priority level inputs new priority level for undefined device.User can be able to be geography fence device
Specify any available priority level.Or user can have limited flexibility or freely input geography fence device
Priority level.Retain for example, some priority levels can be official Government or emergency service geography fence device.Conventional private
People user or can can not obtain the TP top priority for private geographical fence apparatus.In certain situation
Under, outside valve value PRI, air traffic control system manipulator/manager may need to ratify higher priority.For example, private use
Family can ask high precedence.The request to high precedence can be ratified or be refused to air traffic control system.In some cases, it is all
Such as the request to high precedence can be ratified or be refused to government organs' government entity.
Therefore, user can advantageously provide the input of the operation of controllable one or more geography fence devices.User
Input can be provided via remote-control device.Therefore, it is described to control need not to be in the location of geography fence device by user
Manage fence apparatus.In some cases, user can be selected near geography fence device, or can be selected remotely
Manage fence apparatus.The user for controlling the operation of geography fence device can be owner or the manipulation of the geography fence device
Person.The individual point of unmanned vehicle of geography fence device can be likely encountered with control by operating the individual of geographical fence apparatus
Open, or can be same user.
In other embodiments, user directly can interact with geography fence device.User can enclose to geography
Column device provides being manually entered for the operation of controllable geographical fence apparatus.User's input can also control the geography fence to fill
The operation of other geography fence devices near putting.It is, for example, possible to use it is equipped on the user interface on geography fence device
To update one group of air traffic control for the geography fence device manually.The use being equipped on geography fence device can be used
To update other operating characteristicses of geography fence device, such as border of geography fence device or geography fence dress manually in family interface
The priority level put.
Other described operations (for example, being controlled via remote control) for being used to control geography fence device everywhere herein
Any function be readily applicable to the user interface being equipped on the geography fence device.Herein to being shown by user interface
Any descriptions of data be readily applicable to the user interface being equipped on geography fence device.In one example, it is geographical
Fence apparatus can have user to interact to control the operation of geography fence device and/or check local data
Screen and/or button.
Geography fence device software application
User can have the device for performing various functions.Described device can be already present in the property of user.
For example, described device can be computer (for example, personal computer, laptop computer, server), mobile device (for example,
Smart phone, cell phone, tablet PC, personal digital assistant) or any other type device.Described device can be
The network equipment of network service can be passed through.Described device includes one or more Memory Storage Units, and the memory is deposited
Storage unit can include non-transient computer-readable media, and the medium can store that other are described everywhere herein for performing
One or more steps code, logic or instruction.Described device can include one or more processors, and it can basis
Code, logic or the instruction of non-transient computer-readable media as described herein come either individually or collectively perform one or
Multiple steps.For example, user can be communicated using described device (for example, carry out call, send or receive image,
Video or text, send or receive Email).Described device can have can allow subscriber to access Internet or browse network
Browser.
When device provides the reference point on the one group border associated with one group of air traffic control, described device can become into ground
Manage fence apparatus.In some cases, setting position can be provided fly as with one group when geography fence software or application operate in
During the reference point on one group of associated border of row control, described device can be geography fence device.Described device can have
The locator of the position of geography fence device can be provided.For example, it may be determined that smart phone, laptop computer and/or flat board
The position of computer or other mobile devices.Described device can be the device of relative movement (for example, smart phone, honeycomb are electric
Words, tablet PC, personal digital assistant, laptop computer).Any description to mobile device herein goes for appointing
What other kinds of device.
Geography fence application can be downloaded to mobile device.Mobile device can be made from system and mobile device is asked
Ask.In some cases, the system can be air traffic control system, another part of Verification System or any other system.It is described
System can provide Mobile solution to mobile device.Geography fence application can collect the movement from the locator of mobile device
The position of device.For example, if smart phone has locator, geography fence application can use and come from smart phone
The information of locator is to determine the position of geographical fence apparatus.The application can be that air traffic control system (or any other system) carries
For the position of mobile device.The application can be optionally the position that unmanned vehicle provides geography fence device.Mobile dress
Putting can apply that (it can have other described geography everywhere herein to be converted into geography fence device by geography fence
Any property or characteristic of fence apparatus).In some cases, it will start or run the geography fence and apply so that mobile fill
Put and serve as geography fence device.
Alternatively, when downloading geography fence application, mobile device can be registered in geo-fencing system.Example
Such as, mobile device can be registered as the geography fence device with Verification System.User can specify user name and/or close
Code or other can be used for the information that is authenticated later to the user of geographical fence apparatus or geography fence device.Mobile device
There can be unique identifier, the identifier can be such that the mobile device is distinguished with other devices.It is described unique
Identifier can be received via Mobile solution and/or generated by Mobile solution.Can provide as herein other it is described everywhere
Any verification process.
In some embodiments, system can receive the position of geography fence device.The system can be blank pipe system
System or any other system.The system can be gathered around from the same entity that geography fence Mobile solution can be provided to mobile device
Have or operate.Or the system can be from the entity institute of the entity different from that can provide geography fence application to mobile device
Possess or operate.Any description to air traffic control system herein could be applicable in other described any other realities everywhere herein
Body.The position of mobile device can be known and be determined for border that can be associated with one group of air traffic control.Move
The position of dynamic device can provide the reference to one group of air traffic control.The position on border can use the position of mobile device
As reference.For example, if mobile device will move, the position on border can be correspondingly updated to be moved with mobile device
It is dynamic.The position of mobile device can be used for providing reference point as geography fence device.
One group of air traffic control can be generated on air traffic control system.Can be based on providing via geography fence Mobile solution
The position of mobile device and generate one group of air traffic control., can be with when unmanned vehicle enters in the preset range of mobile device
Generate one group of air traffic control.In some embodiments, air traffic control system can receive the position of unmanned vehicle.Unmanned vehicle
Position can determine whether the unmanned vehicle is come into preset range compared with the position of mobile device.Can
With consider as herein other everywhere described any factor or condition (for example, unmanned vehicle information, user profile, environment
Condition, timing) and generate one group of air traffic control.Mobile device can provide the information of the factor of may act as or condition, or other
External data source can be provided that.For example, the information being collected into using other Mobile solutions of mobile device may be used to determine
One group of air traffic control.For example, mobile device can have weather application, the weather application can be exercisable and collect
Information on mobile device local weather.Such information can be provided to determine the local environment conditions of mobile device.
In another example, mobile device can have the local clock that can determine the time.Similarly, mobile device can have to
The access right of family schedule.When it is determined that during one group of air traffic control, it may be considered that the schedule of mobile device users.
Then one group of air traffic control can be transmitted to unmanned vehicle.One group of tof tube can be transmitted to geography fence device
System, the geography fence device then can transmit described group of air traffic control to unmanned vehicle.Unmanned vehicle can basis
One group of air traffic control and operate.
In some embodiments, one group of air traffic control can be generated on mobile device.It can utilize from movement
Device information (for example, the position of mobile device, come self-moving device other Mobile solutions information) and generate one group fly
Row control.When unmanned vehicle is located in the preset range of mobile device, the mobile device can be with receive information.For example,
Mobile device can communicate with unmanned vehicle and receive the position of the unmanned vehicle.Mobile device can compare nothing
The position of people's aircraft and the position of the mobile device are to determine when unmanned vehicle is located at the preset range of mobile device
It is interior.In other cases, mobile device can receive unmanned vehicle position from air traffic control system.Air traffic control system can track each
The position of unmanned vehicle and to mobile device send information.Air traffic control system can also send on unmanned vehicle or nobody
The other information of the user of aircraft.
Mobile device can to or can not to air traffic control system send one group of air traffic control.In some cases, it is mobile
Device directly can send one group of air traffic control to unmanned vehicle.Mobile device can via Mobile solution and and air traffic control system
And/or unmanned vehicle communicates.When geographical fence apparatus is the described mobile device with Mobile solution, such as herein
Other any combinations for being directed to the communication type described by geography fence device everywhere can also be applied.
Mobile solution can also show user interface to the user of device.User can interact with user interface.With
Family interface can show such as other each geography fence device in region and/or associated borders everywhere herein
Information.User interface can show the position of unmanned vehicle.User interface can show that unmanned vehicle is taken or want
The path taken or travel track.User interface can show the letter on the air traffic control associated with geography fence device
Breath.Mobile solution user interface can show such as other described any information everywhere herein.
User can be interacted with the user interface provided by Mobile solution to control the operation of geography fence device.Can
To provide as other described any kind of operations everywhere input herein.For example, user can be provided for one group of flight
One or more parameters of control.User can provide the side of position for one group of air traffic control, relative to mobile device
Boundary.User can specify the type of flight restriction and/or the value for various flight restrictions measurement.User can specify geography to enclose
The priority of column mobile device.When generating one group of air traffic control, it may be considered that the parameter set by user.One group of flight
Control can generate on air traffic control system or on mobile device, and can be based on the parameter from user and
Generation.Therefore, the Mobile solution of geography fence device is served as available for permission mobile device can also provide on described
Manage the information of fence apparatus and/or other geography fence devices and/or allow the operation of user's control geography fence device.
Geography fence plant network
As discussed previously, geography fence device can communicate with one another.In some embodiments, geography fence device can
To be communicated with one another via direct communication or via indirect communication.Can be provided between geography fence device as herein other
Described various types of communications everywhere.
In some embodiments, geography fence device can have the information being equipped on the geography fence device.
Geography fence device information can include on the position of geography fence device, the border of geography fence device and geography fence
The associated air traffic control of device, the priority level of geography fence device and/or geography fence device identity information (for example,
Geography fence type of device or geography fence device identification) information.Geography fence device can use one or more defeated
Enter element to collect data.Input element can be communication module, sensor or any other class that can collect information
The element of type.For example, input element can sense the unmanned flight being likely located in the range of the predetermined geographic of geography fence device
Device.Information on unmanned vehicle can be determined by input element.For example, geography fence device may be able to determine that nothing
The position of people's aircraft, the movement of unmanned vehicle, the identity information of unmanned vehicle are (for example, unmanned vehicle type or nothing
People's aircraft identifier), the physical characteristic of unmanned vehicle, the power stage of unmanned vehicle or on unmanned vehicle appoint
What other information.In another example, input element can collect environmental condition (for example, amblent air temperature, environment complexity, friendship
Through-current capacity or the density of population).For example, input element can be collected on local wind speed and direction and local air traffic
Information.
Any information on geography fence device can be shared with other geography fence devices.In some embodiments,
Geography fence device can share the information and/or any information being collected on geography fence device.Geography fence device
It can be shared with other geography fence devices in the physical extent of the geography fence device.Or geography fence dress
Put the physical extent that information can be shared with other geography fence devices without considering other geography fence devices.Except to
Other geography fence devices are sent outside information, and the geography fence device can also receive from other geography fence devices to be believed
Breath.In some cases, geography fence device can be from other geography fences in the physical extent of the geography fence device
Device receive information.Or geography fence device can from other geography fence device receive informations, without consider it is described other
The physical extent of geography fence device.Geography fence device can also be shared from other geography fences with other geography fence devices
The information that device receives.Enclosed for example, the first geography fence device can share first geography with the second geography fence device
The information that column device receives from the 3rd geography fence device.Similarly, the first geography fence device can be with the 3rd geography fence
Device shares the information that the first geography fence device receives from the second geography fence device.Therefore, by each geography fence
The information that device is collected can be utilized by other geography fence devices.Collective's sex knowledge of multiple geography fence devices can be more respectively
In the knowledge of single geographical fence apparatus.
Therefore, geography fence device can form the network that can share information each other.Geography fence device can create and/
Or the local map of the storage geography fence device.Local map can include the position on the geography fence device
Information.Local map can include the letter of the position on the geography fence device in the range of the geography fence device physical
Breath.The position of other geography fence devices can be received by the geography fence device from other geography fence devices.It can make
The position of the geography fence device is sensed with one or more input elements on geographical fence apparatus.Local map can be with
The information of position including one or more unmanned vehicles in the physical extent on the geography fence device.On nothing
The information of people's aircraft can be collected using one or more input elements of geography fence device, or can be flown from nobody
Row device or other geography fence devices receive.Local map can include the environment bar in the physical extent of geography fence device
Part.In some cases, each geography fence device in geography fence plant network can have local map.In some feelings
Under condition, one or more of geography fence device can have local map.It can share or combine and be enclosed from multiple geography
The information of the local map of column device is to form bigger or more complete map.
Geography fence device can share information.Geography fence device (for example, in a manner of P2P) can be shared directly with one another
Information shares information by means of additional entities.Additional entities can play Information repositories.In some embodiments
In, storage system and/or air traffic control system may be used as being directed to the information that can be shared between different geographical fence apparatus
Repository.
In some embodiments, unmanned vehicle can share information with geography fence device and vice versa.Example
Such as, unmanned vehicle can collect the ambient information that they can share with other geography fence devices.For example, unmanned flight
Device can detect the local information of precipitation and geography fence device.Similarly, geography fence device can be total to unmanned vehicle
Enjoy information.For example, geography fence device can collect the ambient information that they can share with unmanned vehicle.Geography fence
Device can collect the information on local air traffic that the geography fence device can be shared with unmanned vehicle.
Geography fence example
Provided hereinafter how can utilize unmanned vehicle system (including Verification System and/or geography fence device)
Some examples.Such example be to can how some explanations of application system, it is and nonrestrictive.
Example 1:Geography fence device for privacy
With the number increase of unmanned vehicle in spatial domain, personal entity may want to retain the control to their own residence
And retain some privacies.If the unmanned vehicle with camera flies above individual residence, the unmanned vehicle
The image in the residence can be caught, described image can include the private garden or roof of user.Close to the residence
The unmanned vehicle of flight may also result in noise pollution.In some embodiments, fly when novice users are operating nobody
During row device, unmanned vehicle has the risk for the people for hitting individual residence or bumping against at user residence, so as to damage or damage.
It can be desirable to individual can prevent unmanned vehicle from carrying out the personal air of control into them.For example, individual can
It can wish to prevent unmanned vehicle outside its residence or property.Individual may want to make unmanned vehicle prevent to gather around at them
Outside have or their residences renting or subleting.In general, it is probably challenging so to do, because its
Other people may manipulate unmanned vehicle and may be even without recognizing the individual hope, or may be without foot
Enough levels of skill retain the control to unmanned vehicle to prevent the unmanned vehicle from drifting to above homestead
In spatial domain.
Individual can obtain the geography fence device that unmanned vehicle can be prevented to enter in their residence space.
Under certain situation, individual can buy geography fence device or free reception geography fence device.Individual can enclose geography
Column device, which is placed on the individual, wishes in the region that prevention unmanned vehicle enters.
Figure 44 provides how geography fence device can be used together with private residence to limit the use of unmanned vehicle
Diagram.For example, personal A 4410a can buy geography fence device 4420a.Personal A can be by the geography fence device
The a certain position being placed in personal A property.For example, geography fence device can be fixed to personal A house.Geography fence
Device can provide the geography fence border 4430a that unmanned vehicle cannot enter in it.The border can be personal A's
In property.The border can be at personal A boundary location line.The border can be outside personal A property.The border can be with
Unmanned vehicle is prevented into personal A property or is flown above personal A property.The border can prevent all privates
The unmanned vehicle that people possesses enters personal A spatial domain.Even if the manipulator of unmanned vehicle sends and allows the unmanned vehicle
Into the order in personal A spatial domain, the unmanned vehicle can also be not responding to and can be prevented from entering personal A spatial domain.
Unmanned vehicle flight path can be changed automatically to prevent the unmanned vehicle from entering personal A spatial domain.Therefore, personal A
Personal A house can be enjoyed, and without worrying whether unmanned vehicle will enter personal A spatial domain.
Some individuals can not have local geographical fence apparatus.For example, personal B can not mind unmanned vehicle entrance
Personal B spatial domain.Personal B can not have geography fence device.Personal B can not have can prevent what unmanned vehicle passed through
Any border.Therefore, unmanned vehicle 4440 can be found in personal B spatial domain.
Personal C may worry privacy but may not mind have air traffic above personal C property.Personal C
Geography fence device 4420c can be obtained.The geography fence device can be placed on certain in personal C property by personal C
One position.For example, geography fence device can be fixed to personal C house.The geography fence device can provide geography and enclose
Column border 4430c.Personal C geography fence device can allow unmanned vehicle to be flown in border, but can prevent border
Interior camera operation.The border can be in personal C property, can be at personal C boundary location line or can be in personal C
Property outside.The border can prevent all privately held unmanned vehicles from being clapped while in personal C spatial domain
Take the photograph picture.The unmanned vehicle is allowed to be recorded using Airborne Camera on personal C's even if the manipulator of unmanned vehicle sends
The order of the information of house, the camera of the unmanned vehicle can also automatically power off or can be not allowed to store or flow out to appoint
What image.Therefore, personal C can enjoy personal C house, and without worrying whether unmanned vehicle will catch personal C
Property image or catch image out of personal C spatial domain.
Geography fence device can be programmable, and to allow, possess or operate the individual of geographical fence apparatus can
The change limitation associated with the geography fence device.If personal C determined that personal C was no longer desire to allow unmanned flight later
Device flies above personal C property, then personal C can update the geography fence device no longer to allow unmanned vehicle to exist
Flight (device for being similar to personal A) above personal C property.
Any number of personal entity can obtain geography fence device to carry out the control to its house.By carrying
For geography fence device, house can effectively select no longer to allow unmanned vehicle to enter its spatial domain or perform in its spatial domain
Some functions.In one example, geography fence device can be fixed to individual roof, wall, fence, ground, garage or
Any other part of individual residential building.Geography fence device can be outside house, or can be within house.Geography fence
Device be able to can be detected by unmanned vehicle, it may be possible in unmanned vehicle close to individual spatial domain when detection described in
Unmanned vehicle, or can have the position that can be transferred into air traffic control system.Unmanned vehicle in area can be carried out
Control, the control can prevent one group air traffic control of the unmanned vehicle with being associated with geography fence device from contradicting earthquake
Make.
Example 2:For blocking the geography fence device of (containment)
As increasing unmanned vehicle novice users are attempted to manipulate unmanned vehicle, unmanned vehicle crashes or thing
Therefore risk may become higher.In some embodiments, unmanned vehicle novice users may worry that unmanned vehicle floats
Move to depart from and control and crash in the user may not recover the area of unmanned vehicle.For example, if nobody flies
Row device in the area close to water body, user may worry unmanned vehicle float to above water body and when hitting water body by
To infringement.In another example, user, which may worry, makes unmanned vehicle flight make nobody unintentionally on the property of user
Aircraft flight to the garden of neighbours or the unmanned vehicle may not be in other enterable regions, and crash.
It can be desirable to user can manipulate unmanned vehicle but keep ensureing that the unmanned vehicle will rest on specific
In area.For example, individual may want to practise manually handle unmanned vehicle, but unmanned vehicle is not allowed to fly too remote or winged
From sight.User may want to practise manually handle unmanned vehicle, while reduces unmanned vehicle and will be compromised or positioned at not
Risk in recoverable region.
User can obtain the geography fence device that unmanned vehicle can be made to be confined to known area.In certain situation
Under, user can buy geography fence device or free reception geography fence device.Individual can put geography fence device
Put in user wishes the region that is included in unmanned vehicle.
Figure 45 provides the diagram how geography fence device can be used to block unmanned vehicle.Scenario A illustrates nobody
Aircraft 4520a user 4510a can be located at the situation in the house of user.Geography fence can be provided in the house of user
Device 4530a.The geography fence device can have associated border 4540a.Unmanned vehicle can be limited to cause
The unmanned vehicle only allows to fly in the border.User can manually control unmanned vehicle in border
Flight.When unmanned vehicle is close to border, can be prevented from the flight of manipulator's adapter unmanned vehicle it is described nobody fly
Row device leaves the area.The adapter can make unmanned vehicle hovering that unmanned vehicle be taken away into border until user provides
Input, unmanned vehicle auto-steering can be made, can make unmanned vehicle drop to it is described area in or be back to
Point.Border can prevent unmanned vehicle from entering access customer neighbours 4150b property.Therefore, user need not worry unmanned vehicle
Accidentally enter the garden of neighbours and neighbours must not be left alone to obtain the unmanned vehicle, or worry potentially damages neighbours
Object or injury neighbours in garden.
Scenario B illustrates user 4510c can manipulate unmanned vehicle 4520c situation in outdoor environment.Can be in ring
Geography fence device 4530c is provided in border.Associated border 4540c can be provided around the geography fence device.
Under certain situation, geography fence device can be portable.For example, user can pick up geography from the residence of the user
Fence apparatus simultaneously brings it to the local park that the user wishes exercise manipulation unmanned vehicle.Can be to geographical fence apparatus
Be positioned such that one or more possible traps or barrier can be outside borders.For example, water body 4550 or tree 4560
Can be outside border.Then, user be able to can practise manipulating unmanned vehicle, and hit tree without worry unmanned vehicle or fall
Enter in water.
In some embodiments, geography fence device can be picked up and carried between position and position by user.
In another example, user can wear geography fence device or carry geography fence device in the pocket of user.Therefore, use
Family can operate unmanned vehicle, to cause unmanned vehicle is maintained at can be around the side for the user for carrying geography fence device
In boundary.User can go about and manipulate unmanned vehicle.When geographical fence apparatus is worn or carried by user's by user
When in pocket, it can be moved together with user.Therefore, the border of unmanned vehicle can be gone about with user and with
Advance together at family.Unmanned vehicle may remain near user, but can go about with user and be moved together with user
It is dynamic.
System as described herein, apparatus and method go for a variety of objects, including loose impediment and resting
Body.As it was noted above, any description to aircraft such as unmanned vehicles may be applicable to and for any removable herein
Animal body.Any description to aircraft can be specifically adapted to unmanned vehicle herein.The loose impediment of the present invention can
Be configured for moving in any suitable environment, such as in the air (for example, Fixed Wing AirVehicle, rotor craft or
Person both without fixed-wing and also without rotor aircraft), in water (for example, ship or submarine), on the ground (for example,
Motor vehicle, such as car, truck, bus, van, motorcycle, bicycle;Removable frame or framework, it is such as bar-shaped
Thing, fishing rod;Either train), underground (for example, subway), in space (for example, space shuttle, satellite or detector) or
Any combinations of these environment.Loose impediment can be apparatus of transport, such as other described apparatuss of transport everywhere herein.
In some embodiments, loose impediment can be carried by live bodies such as the mankind or animals or taken off from it.Suitably
Animal can include birds, canine, cat class, horse class, ox class, sheep class, pig class, dolphin, rodent or insect.
Loose impediment may can in the environment on six-freedom degree (for example, three translation freedoms and three
Individual rotary freedom) and move freely.Or the mobile of loose impediment may be on one or more frees degree by about
Beam, such as by predefined paths, track or towards being constrained.The movement can be by any suitable cause such as engine or motor
Motivation structure is activated.The actuating mechanism of loose impediment can be provided power by any suitable energy, the energy such as
Electric energy, magnetic energy, solar energy, wind energy, gravitation energy, chemical energy, nuclear energy or its any suitable combination.Loose impediment can be as
Other are described everywhere herein, the self-propelled via propulsion system.The propulsion system alternatively can be run by the energy, described
The energy is such as electric energy, magnetic energy, solar energy, wind energy, gravitation energy, chemical energy, nuclear energy or its any suitable combination.Or
Loose impediment can be as entrained by biology.
In some cases, the loose impediment can be aircraft.For example, aircraft can be Fixed Wing AirVehicle
(for example, aircraft, aerodone), rotor craft (for example, helicopter, gyroplane) while there is flying for fixed-wing and rotor
Row device or the not only aircraft without fixed-wing but also without rotor (for example, dirigible, fire balloon).Aircraft can be self-propelled, all
Such as self-propelled in the air.Self-propelled aircraft can utilize propulsion system, such as including one or more engines, motor, wheel
Son, wheel shaft, magnet, rotor, propeller, blade, the propulsion system of nozzle or its any appropriate combination.In some cases,
Propulsion system, which may be used to loose impediment, can take off from surface, drop on surface, maintaining its current location and/or court
To (for example, hovering), change direction and/or change position.
Loose impediment can by user be remotely controlled or by within loose impediment or on occupant in local control.Can
Mobile object can be remotely controlled via the occupant in independent apparatus of transport.In some embodiments, loose impediment is for nobody
Loose impediment, such as unmanned vehicle.Nobody loose impediment, such as unmanned vehicle, can not have described in taking
The occupant of loose impediment.Loose impediment can by the mankind or self-control system (for example, computer control system) or
Its any suitable combination controls.Loose impediment can be autonomous type or semi-autonomous formula robot, such as be configured with artificial
The robot of intelligence.
Loose impediment can have any suitable size and/or size.In some embodiments, loose impediment
Can have can accommodate mankind occupant be within apparatus of transport or on size and/or size.Or loose impediment can
With with than can accommodate mankind occupant be within apparatus of transport or on size and/or smaller size/or chi
It is very little.Loose impediment can have the size and/or size for being suitable for being carried by the mankind or carried.Or loose impediment can
With more than the size and/or size for being suitable for being carried by the mankind or being carried.In some cases, loose impediment can have
Full-size (for example, length, width, height, diameter, diagonal) less than or equal to about:2cm、5cm、10cm、50cm、1m、
2m, 5m or 10m.The full-size can be greater than or equal to about:2cm, 5cm, 10cm, 50cm, 1m, 2m, 5m or 10m.For example,
The distance between relative axle of rotor of loose impediment can be less than or equal to about:2cm、5cm、10cm、50cm、1m、2m、
5m or 10m.Or the distance between relative axle of rotor can be greater than or equal to about:2cm、5cm、10cm、50cm、1m、
2m, 5m or 10m.
In some embodiments, loose impediment can have less than 100cm x 100cm x 100cm, less than 50cm
X 50cm x 30cm or the volume less than 5cm x 5cm x 3cm.The cumulative volume of loose impediment can be less than or equal to about:
1cm3、2cm3、5cm3、10cm3、20cm3、30cm3、40cm3、50cm3、60cm3、70cm3、80cm3、90cm3、100cm3、
150cm3,200cm3,300cm3,500cm3,750cm3,1000cm3,5000cm3,10,000cm3,100,000cm3,1m3 or
10m3.On the contrary, the cumulative volume of loose impediment can be greater than or equal to about:1cm3、2cm3、5cm3、10cm3、20cm3、
30cm3、40cm3、50cm3、60cm3、70cm3、80cm3、90cm3、100cm3、150cm3、200cm3、300cm3、500cm3、
750cm3,1000cm3,5000cm3,10,000cm3,100,000cm3,1m3 or 10m3.
In some embodiments, (this can refer to by described removable the floor space that loose impediment can have
The cross-sectional area that object is surrounded) less than or equal to about:32,000cm2、20,000cm2、10,000cm2、1,000cm2、
500cm2,100cm2,50cm2,10cm2 or 5cm2.On the contrary, the floor space can be greater than or equal to about:32,
000cm2,20,000cm2,10,000cm2,1,000cm2,500cm2,100cm2,50cm2,10cm2 or 5cm2.
In some cases, loose impediment can be no more than 1000kg weights.The weight of loose impediment can be less than or
Equal to about:1000kg、750kg、500kg、200kg、150kg、100kg、80kg、70kg、60kg、50kg、45kg、40kg、
35kg、30kg、25kg、20kg、15kg、12kg、10kg、9kg、8kg、7kg、6kg、5kg、4kg、3kg、2kg、1kg、0.5kg、
0.1kg, 0.05kg or 0.01kg.On the contrary, the weight can be greater than or equal to about:1000kg、750kg、500kg、
200kg、150kg、100kg、80kg、70kg、60kg、50kg、45kg、40kg、35kg、30kg、25kg、20kg、15kg、
12kg, 10kg, 9kg, 8kg, 7kg, 6kg, 5kg, 4kg, 3kg, 2kg, 1kg, 0.5kg, 0.1kg, 0.05kg or 0.01kg.
In some embodiments, loose impediment can be smaller relative to the load entrained by the loose impediment.
Such as this paper, other are described in further detail everywhere, and the load can include payload and/or carrier.In some instances, it is removable
The ratio between the weight of animal body and weighing load can be more than, less than or equal to about 1:1.In some cases, loose impediment
The ratio between weight and weighing load can be more than, less than or equal to about 1:1.Alternatively, the ratio between vehicle weight and weighing load can be with
It is more than, less than or equal to about 1:1.When needed, the ratio between the weight of loose impediment and weighing load can be less than or equal to:1:
2、1:3、1:4、1:5、1:10 or even more small.On the contrary, the ratio between the weight of loose impediment and weighing load can also be big
In or be equal to:2:1、3:1、4:1、5:1、10:1 or even more big.
In some embodiments, loose impediment can have low energy consumption.For example, loose impediment can use be less than
About:5W/h, 4W/h, 3W/h, 2W/h, 1W/h or smaller.In some cases, the carrier of loose impediment can have low energy
Consumption.For example, the carrier can use be less than about:5W/h, 4W/h, 3W/h, 2W/h, 1W/h or smaller.Alternatively, mobile article
The payload of body can have low energy consumption, such as less than about:5W/h, 4W/h, 3W/h, 2W/h, 1W/h or smaller.
Figure 36 illustrates the unmanned vehicle (UAV) 3600 according to embodiment of the present invention.The unmanned vehicle can be with
It is the example of loose impediment as described herein, and the method and apparatus to be discharged battery component goes for
Thereon.Unmanned vehicle 3600 can include the propulsion system with four rotors 3602,3604,3606 and 3608.It can carry
For any number of rotor (for example, one, two, three, four, five, six or more).The rotation of unmanned vehicle
The wing, rotor assemblies or other propulsion systems can enable the unmanned vehicle hover/holding position, change towards and/or change
Become position.The distance between relative axle of rotor can be any suitable length 3610.For example, length 3610 can be less than
Or equal to 2m, or less than or equal to 5m.In some embodiments, length 3610 can from 40cm to 1m, from 10cm to
2m or from 5cm to 5m in the range of.Any description to unmanned vehicle may be applicable to loose impediment herein, such as not
The loose impediment of same type, and vice versa.Unmanned vehicle can use assisted takeoff system as described herein
Or method.
In some embodiments, loose impediment may be configured for carrying load.The load can include multiplying
One or more among visitor, goods, equipment, instrument etc..The load can be provided in shell.The shell can with can
The shell of mobile object is separated, or a part for the shell of loose impediment.Or load can possess shell, and
Loose impediment does not have shell.Or some parts of load or whole load can be in the case of without shells
There is provided.Load can rigidly fix relative to the loose impediment.Alternatively, load can be can relative to loose impediment
With mobile (for example, can translate or rotate relative to loose impediment).As herein, other are described everywhere, and the load can be with
Including payload and/or carrier.
In some embodiments, loose impediment, carrier and payload relative to fixed reference system (for example, surrounding
Environment) and/or movement relative to each other can be controlled by terminal.The terminal can be in away from the mobile article
The remote control of the opening position of body, carrier and/or payload.Terminal can be placed in support platform or be fixed to support
Platform.Or terminal can be hand-held or wearable device.For example, terminal can include smart phone, flat board calculates
Machine, laptop computer, computer, glasses, gloves, the helmet, microphone or its suitable combination.Terminal can include user
Interface, such as keyboard, mouse, control stick, touch-screen or display.Any suitable user's input is used equally for handing over terminal
Mutually, such as manual input commands, Voice command, gesture control or position control are (for example, via the movement of terminal, position or incline
Tiltedly).
Terminal can be used for any suitable state for controlling loose impediment, carrier and/or payload.For example, eventually
End can be used for controlling loose impediment, carrier and/or payload relative to fixed reference thing from and/or relative to each other
Position and/or direction.In some embodiments, terminal can be used for controlling loose impediment, carrier and/or payload
The emitter of the actuating assembly of discrete component, such as carrier, the sensor of payload or payload.Terminal can include
Suitable for the radio communication device communicated with one or more of loose impediment, carrier or payload.
Terminal can include the suitable display list for being used to check the information of loose impediment, carrier and/or payload
Member.For example, terminal may be configured for showing loose impediment, the information of carrier and/or payload, described information on
Position, point-to-point speed, translational acceleration, direction, angular speed, angular acceleration or its any suitable combination.In some embodiment party
In formula, terminal can be shown by the information of payload offer, the data such as provided by feature payload (for example, by
The image of camera or other image capture devices record).
Alternatively, same terminal can control loose impediment, carrier and/or payload or described removable simultaneously
The state of object, carrier and/or payload, and receive and/or show from the loose impediment, carrier and/or have
Imitate the information of load.For example, terminal can control positioning of the payload relative to environment, while display is caught by payload
View data, or the information of the position on payload.Or different terminals can be used for different functions.Example
Such as, first terminal can control movement or the state of loose impediment, carrier and/or payload, and second terminal can connect
Receive and/or show the information from loose impediment, carrier and/or payload.Have for example, first terminal can be used for control
Positioning of the load relative to environment is imitated, and second terminal shows the view data caught by the payload.Can be removable
Animal body and between controlling the loose impediment simultaneously and receiving the integrated form terminals of data, or loose impediment with it is same
When control the loose impediment and receive and utilize various communication patterns between multiple terminals of data.For example, can be removable
Animal body and control simultaneously the loose impediment and receive the data from the loose impediment terminal between formed to
Few two kinds of different communication patterns.
Figure 37 illustrates the loose impediment for including carrier 3702 and payload 3704 according to embodiment of the present invention
3700.Although loose impediment 3700 is depicted as aircraft, such description is not intended as restricted, and such as
The loose impediment described previously that any suitable type can be used.It will be understood to those of skill in the art that herein in aircraft
Any embodiment described under the scene of system may be applicable to any suitable loose impediment (for example, unmanned flight
Device).In some cases, payload 3704 can be provided in loose impediment 3700 without carrier 3702.It is removable
Object 3700 can include propulsive mechanism 3706, sensing system 3708 and communication system 3710.
As it was noted above, propulsive mechanism 3706 can include rotor, propeller, blade, engine, motor, wheel, wheel shaft,
One or more in magnet or nozzle.Loose impediment can have it is one or more, two or more, three or more
Individual or four or more propulsive mechanisms.Propulsive mechanism can be all same type.Or one or more propulsive mechanisms
It can be different types of propulsive mechanism.Propulsive mechanism 3706 can use any suitable device and be arranged on loose impediment
On 3700, described device is such as other described support components (for example, drive shaft) everywhere herein.Propulsive mechanism 3706 can be with
On any suitable part of loose impediment 3700, such as top, bottom, above, below, side or its is suitable
Combination.
In some embodiments, propulsive mechanism 3706 can enable loose impediment 3700 from surface vertically
Fly or vertically land on the surface, any without loose impediment 3700 is moved horizontally (for example, need not be along runway
Advance).Alternatively, propulsive mechanism 3706 can be with operable to allow loose impediment 3700 with specified location and/or towards outstanding
It is stopped at aerial.One or more propulsive mechanisms 3700 can be controlled independently of other propulsive mechanisms.Or propulsive mechanism
3700 can be configured to be controlled simultaneously.For example, loose impediment 3700 can have multiple rotors horizontally toward, it is described
Rotor can provide lift and/or thrust to the loose impediment.Can activate the multiple rotor horizontally toward with to
Loose impediment 3700 provide take off vertically, vertical landing and hovering ability.In some embodiments, it is described horizontally toward
One or more of rotor can rotate in the clockwise direction, while one or more of described rotor can be with
Rotate in the counterclockwise direction.For example, the number of rotor can be equal to the number of rotor counterclockwise clockwise.Each horizontally toward
The speed of rotation of rotor can be changed independently, to control lift and/or thrust as caused by each rotor, and thereby adjust
Space layout, speed and/or the acceleration of loose impediment 3700 are (for example, on up to three translation freedoms and up to three
Individual rotary freedom).
Sensing system 3708 can include one or more sensors, and the sensor can sense loose impediment 3700
Space layout, speed and/or acceleration (for example, on up to three translation freedoms and up to three rotary freedoms).
One or more of sensors can include global positioning system (GPS) sensor, motion sensor, inertial sensor, away from
From sensor or imaging sensor.The sensing data provided by sensing system 3708 can be used for controlling loose impediment 3700
Space layout, speed and/or direction (for example, using suitable processing unit and/or control module, as described below).Or
Sensing system 3708 may be used to provide the data on loose impediment surrounding environment, such as meteorological condition, away from potential obstacle
The distance of thing, the position of geographical feature, the position etc. of man-made structures.
Communication system 3710 supports the communication via wireless signal 3716 and the terminal 3712 with communication system 3714.It is logical
Letter system 3710, communication system 3714 can include any number of transmitter, receiver and/or receipts for being suitable for radio communication
Send out device.The communication can be one-way communication so that data can only be transmitted in one direction.For example, one-way communication can be only
It is related to loose impediment 3700 and transmits data to terminal 3712, or vice versa.Data can be from the one of communication system 3710
Individual or multiple transmitters are transmitted to one or more receivers of communication system 3712, and or vice versa.Or the communication
Can be two-way communication so that data can be transmitted in the both direction between loose impediment 3700 and terminal 3712.It is double
It can be related to from one or more transmitters of communication system 3710 to communication and be received to the one or more of communication system 3714
Device transmits data, and vice versa.
In some embodiments, terminal 3712 can be to loose impediment 3700, carrier 3702 and payload 3704
One or more of control data is provided, and from one in loose impediment 3700, carrier 3702 and payload 3704
Individual or multiple receive informations are (for example, loose impediment, the position of carrier or payload and/or movable information;By payload
The data of sensing, such as by the view data of payload cameras capture).In some cases, the control data of self terminal is carried out
The instruction for loose impediment, the relative position of carrier and/or payload, movement, actuating or control can be included.Example
Such as, control data can cause loose impediment position and/or direction modification (for example, the control via propulsive mechanism 3706
System), or payload is relative to the movement (for example, control via carrier 3702) of loose impediment.Carry out the control of self terminal
Data processed can cause the control to payload, the control of such as operation to camera or other image capture devices (for example,
Static or mobile picture is shot, zooms in or out, be turned on and off, switch imaging pattern, change image resolution ratio, changing and gather
Burnt, the change depth of field, change the time for exposure, change visual angle or the visual field).In some cases, from loose impediment, carrier and/
Or the communication of payload can include from one or more sensors (for example, sensing system 3708 or payload
3704 sensor) information.The communication can be included from one or more different types of sensors (for example, GPS is passed
Sensor, motion sensor, inertial sensor, range sensor or imaging sensor) the information sensed.Such information can
With the position (for example, position, direction) on loose impediment, carrier and/or payload, mobile or acceleration.To have by oneself
The shape sensed of the data or payload caught by the payload can be included by imitating such information of load
State.The control data for being provided and being transmitted by terminal 3712 may be configured for control loose impediment 3700, carrier 3702 or
The state of one or more of payload 3704.Alternatively or in combination, carrier 3702 and payload 3704 can be with
Each include communication module, the communication module is configured for communicating with terminal 3712, to cause the terminal independent
Ground communicates with each in loose impediment 3700, carrier 3702 and payload 3704 and it is controlled by.
In some embodiments, loose impediment 3700 may be configured for communicating with another remote-control device ---
It is additional to terminal 3712 or replaces terminal 3712.Terminal 3712 is also configured to be used for and another remote-control device and removable
Object 3700 communicates.For example, loose impediment 3700 and/or terminal 3712 can with another loose impediment or it is another can
The carrier or payload of mobile object communicate.When needed, the remote-control device can be second terminal or other calculating
Device (for example, computer, laptop computer, tablet PC, smart phone or other mobile devices).Remote-control device can quilt
It is disposed for transmitting data to loose impediment 3700, data is received from loose impediment 3700, transmit number to terminal 3712
Data are received according to and/or from terminal 3712.Alternatively, remote-control device can be connected to internet or other communication networks,
To cause the data from loose impediment 3700 and/or the reception of terminal 3712 to be uploaded to website or server.
Figure 38 be according to embodiment of the present invention be used for control loose impediment system 3800 by block diagram for
Bright schematic diagram.System 3800 can be combined with system disclosed herein, any suitable embodiment of apparatus and method
Use.System 3800 can include sensing module 3802, processing unit 3804, non-transient computer-readable media 3806, control
Module 3808 and communication module 3810.
Sensing module 3802 can utilize and collect the different types of of the information relevant with loose impediment by different way
Sensor.Different types of sensor can sense different types of signal or the signal from separate sources.For example, the biography
Sensor can include inertial sensor, GPS sensor, range sensor (for example, laser radar) or vision/imaging sensor
(for example, camera).Sensing module 3802 can be operably coupled to the processing unit 3804 with multiple processors.At some
In embodiment, sensing module can be operably coupled to transport module 3812 (for example, Wi-Fi image transmission modules), institute
Transport module is stated to be configured for directly transmitting sensing data to suitable external device (ED) or system.For example, transport module
3812 can be used for remote terminal transmission by sensing module 3802 cameras capture image.
Processing unit 3804 can have one or more processors, and such as programmable processor is (for example, CPU
(CPU)).Processing unit 3804 can be operably coupled to non-transient computer-readable media 3806.Non-transient computer can
Read medium 3806 can store logic, code and/or the programmed instruction that can be performed by processing unit 3804, to perform one or
Multiple steps.Non-transient computer-readable media can include one or more memory cells (for example, removable medium or outer
Portion stores, such as SD card or random access memory (RAM)).In some embodiments, the data from sensing module 3802
It can be conveyed directly to and be stored in the memory cell of non-transient computer-readable media 3806.Non-transient computer-readable Jie
The memory cell of matter 3806 can store logic, code and/or the programmed instruction that can be performed by processing unit 3804, to hold
Any suitable embodiment of row approach described herein.Refer to for example, processing unit 3804 may be configured for execution
Order, so that the one or more processors of processing unit 3804 analyze the sensing data as caused by sensing module.Memory list
Member can store will by processing unit 3804 sensing data handling, from sensing module.In some embodiments, non-wink
The memory cell of state computer-readable medium 3806 can be used for storage result as caused by processing unit 3804.
In some embodiments, processing unit 3804 can be operably coupled to control module 3808, the control
Module 3808 is configured for controlling the state of loose impediment.For example, control module 3808 may be configured for controlling
The propulsive mechanism of loose impediment is to adjust space layout, speed and/or acceleration of the loose impediment on six-freedom degree.
Alternatively or in combination, control module 3808 can be with one in the state of control vector, payload or sensing module or more
It is individual.
Processing unit 3804 can be operably coupled to communication module 3810, and the communication module 3810 is configured to use
In transmission and/or receive the data from one or more external device (ED)s (for example, terminal, display device or other remote controls).
Any suitable means of communication, such as wire communication or radio communication can be used.For example, communication module 3810 can utilize office
Domain net (LAN), wide area network (WAN), infrared ray, radio, WiFi, point-to-point (P2P) network, communication network, cloud communication etc. it
In one or more.It is alternatively possible to use relay station, such as tower, satellite or mobile station.Radio communication may rely on away from
With a distance from from or independently of.In some embodiments, communication may need or may not be needed sight.Communication module 3810 can
To transmit and/or receive the sensing data from sensing module 3802, result, predetermined control as caused by processing unit 3804
One or more of data processed, the user command for coming self terminal or remote control etc..
The part of system 3800 can be arranged by any suitable configuration.For example, one or more portions of system 3800
Part can be located at loose impediment, carrier, payload, terminal, sensing system or communicate with above-mentioned one or more
On additional external device (ED).In addition, although Figure 38 depicts single treatment unit 3804 and single non-transient computer-readable Jie
Matter 3806, it will be apparent, however, to one skilled in the art, that this is not intended as restricted, and system 3800 can include it is more
Individual processing unit and/or non-transient computer-readable media.In some embodiments, multiple processing units and/or non-transient
One or more of computer-readable medium can be located at different positions, such as in loose impediment, carrier, effectively carry
Lotus, terminal, sensing module, on the additional external device (ED) that is communicated with above-mentioned one or more or it is suitably combined, with
So that the processing performed by system 3800 and/or any suitable aspect of memory function can be betided in one or more
State opening position.
Although the preferred embodiment of the present invention has been illustrated and described herein, it is aobvious for those skilled in the art and
It is clear to, such embodiment simply provides in an illustrative manner.Those skilled in the art now will be without departing from this
Many changes are expected in the case of invention, changes and substitutes.It should be appreciated that it can be used to this during the present invention is put into practice
The various alternative solutions of embodiment of the present invention described by text.Appended claims be intended to limit the scope of the present invention, and because
This covers the method and structure in the range of these claims and its equivalent item.
Claims (433)
1. a kind of unmanned vehicle (UAV), including:
Flight control units, the flight control units are used for the operation for controlling the unmanned vehicle;And
Mark module, the mark module are integrated into the flight control units, wherein the mark module is from other nothings
The unmanned vehicle is uniquely identified out in people's aircraft.
2. unmanned vehicle as claimed in claim 1, wherein the mark module can not damage the flight control list
Remainder in the case of the function of member with the flight control units separates.
3. unmanned vehicle as claimed in claim 1, wherein the mark module can not separate with the flight control units.
4. unmanned vehicle as claimed in claim 3, wherein can not be single-handedly single by the mark module and the flight control
Member separates.
5. unmanned vehicle as claimed in claim 1, wherein the mark module is nextport hardware component NextPort, the nextport hardware component NextPort to prevent
Only user's change stores the unique identifier for the mode of unique unmanned vehicle identifier of the unmanned vehicle.
6. unmanned vehicle as claimed in claim 5, wherein unique unmanned vehicle identifier is with not modifiable shape
State is stored in the mark module.
7. unmanned vehicle as claimed in claim 1, wherein the flight control units are used to control the unmanned vehicle
Flight.
8. unmanned vehicle as claimed in claim 1, wherein the flight control units are used to control the unmanned vehicle
The positioning of pay(useful) load on machine.
9. unmanned vehicle as claimed in claim 1, wherein the flight control units are used to control the unmanned vehicle
The operation of one or more sensors on machine.
10. unmanned vehicle as claimed in claim 1, wherein the flight control units also include the unmanned vehicle machine
On one or more processors and communication unit.
11. unmanned vehicle as claimed in claim 1, wherein the mark module is write-once type memory.
12. unmanned vehicle as claimed in claim 1, wherein the mark module outside can not be read.
13. unmanned vehicle as claimed in claim 1, wherein the mark module includes unmanned vehicle key, the nothing
People's aircraft key is used to provide the authentication verification to the unmanned vehicle.
14. unmanned vehicle as claimed in claim 13, wherein the unmanned vehicle key is alpha-numeric string, the word
Female numeric string is unique for the unmanned vehicle and is stored in the mark module.
15. unmanned vehicle as claimed in claim 14, wherein what the unmanned vehicle key was randomly generated.
16. unmanned vehicle as claimed in claim 1, wherein the mark module, which can not use, individually corresponds to the mark
Module and need the software version that the key operated and separated with the remainder of the flight control units.
17. unmanned vehicle as claimed in claim 16, identified wherein the mark module also includes unique unmanned vehicle
Symbol.
18. unmanned vehicle as claimed in claim 17, wherein the key and unique unmanned vehicle identifier knot
Close and use, so that the operation of the unmanned vehicle is authenticated and allowed to the unmanned vehicle.
19. unmanned vehicle as claimed in claim 18, wherein being come pair using the authentication center outside the unmanned vehicle machine
The key and unique unmanned vehicle identifier are authenticated.
20. unmanned vehicle as claimed in claim 18, wherein the key is unique, and the key and it is described only
One unmanned vehicle identifier is issued by the identity registry database outside the unmanned vehicle machine.
21. unmanned vehicle as claimed in claim 1, wherein one of the mark module and the flight control units or
Multiple other assemblies are integrated in an encapsulation in same chip.
22. unmanned vehicle as claimed in claim 1, wherein the mark module is soldered to the electricity of the flight control units
On the plate of road.
23. unmanned vehicle as claimed in claim 1, wherein the mark module is issued by controlled entity.
24. unmanned vehicle as claimed in claim 23, wherein the controlled entity is government organs or by government authorization
Manipulator.
25. unmanned vehicle as claimed in claim 23, wherein the controlled entity is international organization.
26. unmanned vehicle as claimed in claim 23, wherein the controlled entity is enterprise.
27. the method for one kind mark unmanned vehicle (UAV), methods described include:
The operation of the unmanned vehicle is controlled using flight control units;And
Using the mark module being integrated in the flight control units institute is uniquely identified out from other unmanned vehicles
State unmanned vehicle.
28. method as claimed in claim 27, wherein the mark module can not damage the flight control units
Remainder in the case of function with the flight control units separates.
29. method as claimed in claim 27, wherein the mark module can not separate with the flight control units.
30. method as claimed in claim 29, wherein can not be single-handedly by the mark module and the flight control units point
Open.
31. method as claimed in claim 27, wherein the mark module is nextport hardware component NextPort, the nextport hardware component NextPort is to prevent from using
Family change stores the unique identifier for the mode of unique unmanned vehicle identifier of the unmanned vehicle.
32. method as claimed in claim 31, wherein unique unmanned vehicle identifier is stored up with not modifiable state
Exist in the mark module.
33. method as claimed in claim 27, wherein the flight control units are used to control flying for the unmanned vehicle
OK.
34. method as claimed in claim 27, wherein the flight control units are used to control the unmanned vehicle machine
Pay(useful) load positioning.
35. method as claimed in claim 27, wherein the flight control units are used to control the unmanned vehicle machine
One or more sensors operation.
36. method as claimed in claim 27, wherein the flight control units also include on the unmanned vehicle machine
One or more processors and communication unit.
37. method as claimed in claim 27, wherein the mark module is write-once type memory.
38. method as claimed in claim 27, wherein the mark module outside can not be read.
39. method as claimed in claim 27, wherein the mark module includes unmanned vehicle key, the unmanned flight
Device key is used to provide the authentication verification to the unmanned vehicle.
40. method as claimed in claim 39, wherein the unmanned vehicle key is alpha-numeric string, the alphanumeric
String is unique for the unmanned vehicle and is stored in the mark module.
41. method as claimed in claim 40, wherein what the unmanned vehicle key was randomly generated.
42. method as claimed in claim 39, wherein the mark module, which can not use, individually corresponds to the mark module
And need the software version that the key is operated and separated with the remainder of the flight control units.
43. method as claimed in claim 39, wherein the mark module also includes unique unmanned vehicle identifier.
44. method as claimed in claim 43, wherein the key is used in combination with unique unmanned vehicle identifier,
So that the operation of the unmanned vehicle is authenticated and allowed to the unmanned vehicle.
45. method as claimed in claim 44, wherein using the authentication center outside the unmanned vehicle machine come to described close
Key and unique unmanned vehicle identifier are authenticated.
46. method as claimed in claim 44, wherein the key is unique, and the key and it is described it is unique nobody
Aircraft identifier is issued by the identity registry database outside the unmanned vehicle machine.
47. method as claimed in claim 27, wherein the mark module and the one or more of the flight control units
Other assemblies are integrated in an encapsulation in same chip.
48. method as claimed in claim 27, wherein the mark module is soldered to the circuit board of the flight control units
On.
49. method as claimed in claim 27, wherein the mark module is issued by controlled entity.
50. method as claimed in claim 49, wherein the controlled entity is government organs or the manipulator by government authorization.
51. method as claimed in claim 49, wherein the controlled entity is international organization.
52. method as claimed in claim 49, wherein the controlled entity is enterprise.
53. a kind of unmanned vehicle (UAV), including:
Flight control units, the flight control units are used for the operation for controlling the unmanned vehicle,
Wherein described flight control units include mark module and chip,
Wherein described mark module uniquely identifies out the unmanned vehicle for (1) from other unmanned vehicles, (2) bag
The original records of the chip are included, and (3) collect after the original records including the chip on the chip
Information,
Wherein described mark module is used to undergo self-check program, the letter on the chip that the self-check program will collect
Cease compared with the original records of the chip, and
Wherein described mark module is used for when collecting information on the chip and the original records of the chip are inconsistent
When warning is provided.
54. unmanned vehicle as claimed in claim 53, wherein the mark module is integrated in the flight control units.
55. unmanned vehicle as claimed in claim 54, wherein the mark module can not be with the flight control units point
Open.
56. unmanned vehicle as claimed in claim 53, wherein the chip is processor chips or communication chip.
57. unmanned vehicle as claimed in claim 53, wherein the flight control modules include multiple chips.
58. unmanned vehicle as claimed in claim 53, wherein the record of the chip includes the model, described of the chip
The sequence number of the information of the manufacturer of chip or the chip.
59. unmanned vehicle as claimed in claim 53, wherein when the unmanned vehicle is powered, the self-check program is certainly
It is dynamic to start.
60. unmanned vehicle as claimed in claim 53, wherein during the operation of the unmanned vehicle, the self-test journey
The regular automatic start of sequence.
61. unmanned vehicle as claimed in claim 53, wherein the flight control units are used to control the unmanned flight
The flight of device.
62. unmanned vehicle as claimed in claim 53, wherein the flight control units are used to control the unmanned flight
The positioning of pay(useful) load on device machine.
63. unmanned vehicle as claimed in claim 53, wherein the flight control units are used to control the unmanned flight
The operation of one or more sensors on device machine.
64. unmanned vehicle as claimed in claim 53, wherein the flight control units also include one or more processing
Device and communication unit.
65. unmanned vehicle as claimed in claim 53, wherein the mark module is write-once type memory.
66. unmanned vehicle as claimed in claim 53, wherein the mark module outside can not be read.
67. unmanned vehicle as claimed in claim 53, wherein the mark module includes unmanned vehicle key, the nothing
People's aircraft key is used to provide the authentication verification to the unmanned vehicle.
68. the unmanned vehicle as described in claim 67, identified wherein the mark module also includes unique unmanned vehicle
Symbol.
69. unmanned vehicle as recited in claim 68, wherein the key and unique unmanned vehicle identifier knot
Close and use, so that the operation of the unmanned vehicle is authenticated and allowed to the unmanned vehicle.
70. the unmanned vehicle as described in claim 69, wherein being come pair using the authentication center outside the unmanned vehicle machine
The key and unique unmanned vehicle identifier are authenticated.
71. the unmanned vehicle as described in claim 69, wherein the key is unique, and the key and it is described only
One unmanned vehicle identifier is issued by the identity registry database outside the unmanned vehicle machine.
72. unmanned vehicle as claimed in claim 53, wherein the mark module is issued by controlled entity.
73. the unmanned vehicle as described in claim 72, wherein the controlled entity is government organs or by government authorization
Manipulator.
74. the method for one kind mark unmanned vehicle (UAV), methods described include:
The operation of the unmanned vehicle is controlled using flight control units, wherein the flight control units include mark mould
Block and chip;
The unmanned vehicle is uniquely identified out from other unmanned vehicles using the mark module, wherein the mark
Knowing module includes the original records of the chip;
After the original records including the chip, collect the information on the chip;
Using the mark module, information on the chip will be collected and the original records of the chip are compared
Compared with so as to undergo self-check program;And
When the described information and the inconsistent original records of the chip on the chip collected, there is provided warning.
75. the method as described in claim 74, wherein the mark module is integrated in the flight control units.
76. the method as described in claim 75, wherein the mark module can not separate with the flight control units.
77. the method as described in claim 74, wherein the chip is processor chips or communication chip.
78. the method as described in claim 74, wherein the flight control modules include multiple chips.
79. the method as described in claim 74, wherein the record of the chip includes the model of the chip, the core
The sequence number of the information of the manufacturer of piece or the chip.
80. the method as described in claim 74, wherein when the unmanned vehicle is powered, the self-check program opens automatically
It is dynamic.
81. the method as described in claim 74, wherein during the operation of the unmanned vehicle, the self-check program is regular
Automatic start.
82. the method as described in claim 74, wherein the flight control units are used to control flying for the unmanned vehicle
OK.
83. the method as described in claim 74, wherein the flight control units are used to control the unmanned vehicle machine
Pay(useful) load positioning.
84. the method as described in claim 74, wherein the flight control units are used to control the unmanned vehicle machine
One or more sensors operation.
85. the method as described in claim 74, wherein the flight control units also include one or more processors and
Communication unit.
86. the method as described in claim 74, wherein the mark module is write-once type memory.
87. the method as described in claim 74, wherein the mark module outside can not be read.
88. the method as described in claim 74, wherein the mark module includes unmanned vehicle key, the unmanned flight
Device key is used to provide the authentication verification to the unmanned vehicle.
89. the method as described in claim 88, wherein the mark module also includes unique unmanned vehicle identifier.
90. the method as described in claim 89, wherein the key and unique unmanned vehicle identifier are used in combination,
So that the operation of the unmanned vehicle is authenticated and allowed to the unmanned vehicle.
91. the method as described in claim 90, wherein using the authentication center outside the unmanned vehicle machine come to described close
Key and unique unmanned vehicle identifier are authenticated.
92. the method as described in claim 90, wherein the key is unique, and the key and it is described it is unique nobody
Aircraft identifier is issued by the identity registry database outside the unmanned vehicle machine.
93. the method as described in claim 74, wherein the mark module is issued by controlled entity.
94. the method as described in claim 93, wherein the controlled entity is government organs or the manipulator by government authorization.
95. the method for one kind operation unmanned vehicle (UAV), methods described include:
Unmanned vehicle identifier is received, the unmanned vehicle identifier uniquely identifies out institute from other unmanned vehicles
State unmanned vehicle;
User identifier is received, the user identifier uniquely identifies out user from other users;
By means of one or more processors, assess the user identified by the user identifier whether be authorized to operation by
The unmanned vehicle of the unmanned vehicle identifier mark;And
When the user, which is authorized to, operates the unmanned vehicle, it is allowed to which the user grasps to the unmanned vehicle
Make.
96. the method as described in claim 95, wherein the unmanned vehicle broadcasts the unmanned vehicle during operation
Identifier.
97. the method as described in claim 96, wherein persistently broadcasting the unmanned vehicle identifier.
98. the method as described in claim 96, wherein broadcasting the unmanned vehicle identifier according to request.
99. the method as described in claim 98, wherein the request according to the air traffic control system outside the unmanned vehicle machine
And broadcast the unmanned vehicle identifier.
100. the method as described in claim 99, wherein when the communication between the unmanned vehicle and the air traffic control system will
It is encrypted or during certification, broadcasts the unmanned vehicle identifier.
101. the method as described in claim 96, wherein broadcasting the nothing via radio signal, optical signal or acoustical signal
People's aircraft identifier.
102. the method as described in claim 95, wherein receiving the nothing at air traffic control system outside the unmanned vehicle machine
People's aircraft identifier and the user identifier.
103. the method as described in claim 102, wherein one or more of processors are located at the air traffic control system.
104. the method as described in claim 102, wherein the air traffic control system generates what the unmanned vehicle operated according to this
One or more groups of air traffic control.
105. the method as described in claim 104, wherein one or more groups of air traffic control are to be based on the unmanned flight
The position of device and generate.
106. the method as described in claim 104, wherein one or more groups of air traffic control are to be based on the unmanned flight
Device identifier or the user identifier and generate.
107. the method as described in claim 95, in addition to when the user uncommitted operation unmanned vehicle,
The user is not allowed to operate the unmanned vehicle.
108. the method as described in claim 95, in addition to when the user uncommitted operation unmanned vehicle,
Only allow in a limited manner to operate the unmanned vehicle.
109. the method as described in claim 95, in addition to when the user uncommitted operation unmanned vehicle,
Selected opening position is only allowed in operate the unmanned vehicle.
110. the method as described in claim 95, wherein only described user is authorized to the operation unmanned vehicle.
111. the method as described in claim 95, plurality of user is authorized to the operation unmanned vehicle.
112. the method as described in claim 95, wherein the user is registered in advance, to be authorized to the user
Operate the unmanned vehicle.
113. the method as described in claim 95, wherein the user identifier indicates that user has reached minimum technical ability threshold
Value, to make the user be authorized to the operation unmanned vehicle.
114. the method as described in claim 95, in addition to when another user that control is taken over from the user is authorized to operation
The unmanned vehicle and during with operation grade than the user Geng Gao, it is allowed to another user to it is described nobody fly
Row device is operated.
115. the method as described in claim 114, wherein when described in another user's operation described in the unmanned vehicle certification
During the privilege of unmanned vehicle, it is allowed to which another user operates to the unmanned vehicle.
116. the method as described in claim 115, wherein number of the certification by means of the identity of checking another user
Word sign and/or digital certificate and occur.
117. the method as described in claim 114, wherein another user is electronic police or air traffic control system manipulator.
118. the method as described in claim 114, wherein another user is the member of defense force or quasi- defense force.
119. the method as described in claim 118, wherein another user is USAF, United States Coasts Guard, U.S.
National security guard of state, the member of Chinese Armed Police Force (CAPF).
120. the method as described in claim 114, in addition to notify the user:Another user is taking over control.
121. the method as described in claim 114, wherein another user enters limited area in the unmanned vehicle
When adapter control.
122. the method as described in claim 121, wherein will control after the unmanned vehicle leaves the limited area
System gives back the user.
123. the method as described in claim 114, in addition to be the described another of the operation grade with than the user Geng Gao
One user provides less limitation.
124. the method as described in claim 95, in addition to when the unmanned vehicle is in the environment with lower complexity
During operation, the limitation to unmanned vehicle flight is reduced.
125. the method as described in claim 95, in addition to based on the user identifier adjust or keep to it is described nobody
The limitation of aircraft flight.
126. the method as described in claim 95, in addition to adjust or keep to institute based on the unmanned vehicle identifier
State the limitation of unmanned vehicle flight.
127. one kind includes the non-transient computer-readable media for the programmed instruction for being used to operate unmanned vehicle (UAV), described
Computer-readable medium includes:
The unmanned vehicle identifier of the unmanned vehicle is uniquely identified out from other unmanned vehicles for receiving
Programmed instruction;
The programmed instruction of the user identifier of user is uniquely identified out from other users for receiving;
Identified for assessing the whether authorized operation of the user identified by the user identifier by the unmanned vehicle
Accord with the programmed instruction of the unmanned vehicle of mark;And
For allowing the user to carry out the unmanned vehicle when the user is authorized to and operates the unmanned vehicle
The programmed instruction of operation.
128. the non-transient computer-readable media as described in claim 127, wherein the unmanned vehicle is during operation
Broadcast the unmanned vehicle identifier.
129. the non-transient computer-readable media as described in claim 128, wherein continuously broadcasting the unmanned vehicle mark
Know symbol.
130. the non-transient computer-readable media as described in claim 128, wherein broadcasted according to request it is described nobody fly
Row device identifier.
131. the non-transient computer-readable media as described in claim 130, wherein basis comes from the unmanned vehicle machine
The request of outer air traffic control system and broadcast the unmanned vehicle identifier.
132. the non-transient computer-readable media as described in claim 131, wherein when the unmanned vehicle and the sky
Communication between guard system will be encrypted or during certification, broadcast the unmanned vehicle identifier.
133. the non-transient computer-readable media as described in claim 128, wherein via radio signal, optical signal or sound
Signal broadcasts the unmanned vehicle identifier.
134. the non-transient computer-readable media as described in claim 127, wherein the sky outside the unmanned vehicle machine
The unmanned vehicle identifier and the user identifier are received at guard system.
135. the non-transient computer-readable media as described in claim 134, wherein one or more of processors are located at
At the air traffic control system.
136. the non-transient computer-readable media as described in claim 134, wherein air traffic control system generation it is described nobody
One or more groups of air traffic control that aircraft operates according to this.
137. the non-transient computer-readable media as described in claim 136, wherein one or more groups of air traffic control are
Position based on the unmanned vehicle and generate.
138. the non-transient computer-readable media as described in claim 136, wherein one or more groups of air traffic control are
Generated based on the unmanned vehicle identifier or the user identifier.
139. the non-transient computer-readable media as described in claim 127, in addition to it is uncommitted for working as the user
The programmed instruction for not allowing the user to operate the unmanned vehicle when operating the unmanned vehicle.
140. the non-transient computer-readable media as described in claim 127, in addition to it is uncommitted for working as the user
Only allow the programmed instruction operated in a limited manner to the unmanned vehicle when operating the unmanned vehicle.
141. non-transient computer-readable media as described in claim 127, in addition to it is uncommitted for working as the user
The programmed instruction that selected opening position is operated to the unmanned vehicle is only allowed in when operating the unmanned vehicle.
142. non-transient computer-readable media as described in claim 127, wherein only described user is authorized to described in operation
Unmanned vehicle.
143. non-transient computer-readable media as described in claim 127, plurality of user are authorized to the operation nothing
People's aircraft.
144. non-transient computer-readable media as described in claim 127, wherein the user is registered in advance, so as to
The user is set to be authorized to the operation unmanned vehicle.
145. non-transient computer-readable media as described in claim 127, wherein the user identifier indicates user
Minimum skills threshold is reached, to make the user be authorized to the operation unmanned vehicle.
146. non-transient computer-readable media as described in claim 127, in addition to for being controlled when from user adapter
When another user of system is authorized to the operation unmanned vehicle and has the operation grade than the user Geng Gao, it is allowed to institute
State the programmed instruction that another user is operated to the unmanned vehicle.
147. non-transient computer-readable media as described in claim 146, wherein when described in the unmanned vehicle certification
When another user operates the privilege of the unmanned vehicle, it is allowed to which another user operates to the unmanned vehicle.
148. non-transient computer-readable media as described in claim 147, wherein certification are by means of verifying another use
Digital signature and/or the digital certificate of the identity at family and occur.
149. non-transient computer-readable media as described in claim 146, wherein another user be electronic police or
Air traffic control system manipulator.
150. non-transient computer-readable media as described in claim 146, wherein another user be defense force or
The member of quasi- defense force.
151. non-transient computer-readable media as described in claim 150, wherein another user is USAF, U.S.
Coast Guard of state, National Guard of the United States, Chinese Armed Police Force CAPF member.
152. non-transient computer-readable media as described in claim 146, in addition to for described in user notice
The programmed instruction of another user adapter control.
153. non-transient computer-readable media as described in claim 146, wherein another user it is described nobody fly
Adapter control when row device enters limited regional.
154. non-transient computer-readable media as described in claim 153, wherein being left in the unmanned vehicle described
The user is given back into control after limited area.
155. non-transient computer-readable media as described in claim 146, in addition to for being with than the user more
Another user of high operation grade provides the programmed instruction of less limitation.
156. non-transient computer-readable media as described in claim 127, in addition to for existing when the unmanned vehicle
The programmed instruction of the limitation to unmanned vehicle flight is reduced when being operated in the environment with lower complexity.
157. non-transient computer-readable media as described in claim 127, in addition to for being based on the user identifier
And adjust or keep the programmed instruction of the limitation to unmanned vehicle flight.
158. non-transient computer-readable media as described in claim 127, in addition to for being based on the unmanned vehicle
Identifier and adjust or keep to the unmanned vehicle flight limitation programmed instruction.
A kind of 159. unmanned vehicle (UAV) authoring systems, including:
One or more processors, it is either individually or collectively used for:
Unmanned vehicle identifier is received, the unmanned vehicle identifier uniquely identifies out institute from other unmanned vehicles
State unmanned vehicle;
User identifier is received, the user identifier uniquely identifies out user from other users;
Assess whether the user identified by the user identifier is authorized to operation by the unmanned vehicle identifier mark
The unmanned vehicle known;And
When the user, which is authorized to, operates the unmanned vehicle, transmission signal is to allow the user to the unmanned flight
Device is operated.
160. system as described in claim 159, wherein the unmanned vehicle broadcasts the unmanned flight during operation
Device identifier.
161. system as described in claim 160, wherein persistently broadcasting the unmanned vehicle identifier.
162. system as described in claim 160, wherein broadcasting the unmanned vehicle identifier according to request.
163. system as described in claim 162, wherein asking according to the air traffic control system outside the unmanned vehicle machine
Ask and broadcast the unmanned vehicle identifier.
164. system as described in claim 163, wherein when the communication between the unmanned vehicle and the air traffic control system
It is encrypted or during certification, broadcasts the unmanned vehicle identifier.
165. system as described in claim 160, wherein broadcasting the nothing via radio signal, optical signal or acoustical signal
People's aircraft identifier.
166. system as described in claim 159, wherein described in being received at air traffic control system outside the unmanned vehicle machine
Unmanned vehicle identifier and the user identifier.
167. system as described in claim 166, wherein one or more of processors are located at the air traffic control system.
168. system as described in claim 166, wherein the air traffic control system generates what the unmanned vehicle operated according to this
One or more groups of air traffic control.
169. system as described in claim 168, wherein one or more groups of air traffic control are to be based on the unmanned flight
The position of device and generate.
170. system as described in claim 168, wherein one or more groups of air traffic control are to be based on the unmanned flight
Device identifier or the user identifier and generate.
171. system as described in claim 159, wherein when the user uncommitted operation unmanned vehicle, institute
Stating one or more processors does not either individually or collectively allow the user to operate the unmanned vehicle.
172. system as described in claim 159, wherein when the user uncommitted operation unmanned vehicle, institute
Stating one or more processors either individually or collectively only allows in a limited manner to operate the unmanned vehicle.
173. system as described in claim 159, wherein when the user uncommitted operation unmanned vehicle, institute
State one or more processors and be either individually or collectively only allowed in selected opening position and the unmanned vehicle is operated.
174. system as described in claim 159, wherein only described user is authorized to the operation unmanned vehicle.
175. system as described in claim 159, plurality of user are authorized to the operation unmanned vehicle.
176. system as described in claim 159, wherein the user is registered in advance, to be authorized to the user
Operate the unmanned vehicle.
177. system as described in claim 159, wherein the user identifier indicates that user has reached minimum technical ability
Threshold value, to make the user be authorized to the operation unmanned vehicle.
178. system as described in claim 159, wherein when another user that control is taken over from the user is authorized to operation
The unmanned vehicle and during with operation grade than the user Geng Gao, one or more of processors individually or
Another user is jointly allowed to operate the unmanned vehicle.
179. system as described in claim 178, wherein when described in another user's operation described in the unmanned vehicle certification
During the privilege of unmanned vehicle, it is allowed to which another user operates to the unmanned vehicle.
180. system as described in claim 179, wherein certification are by means of verifying that the numeral of the identity of another user is signed
Name and/or digital certificate and occur.
181. system as described in claim 178, wherein another user is electronic police or air traffic control system manipulator.
182. system as described in claim 178, wherein another user is the member of defense force or quasi- defense force.
183. system as described in claim 182, wherein another user is USAF, United States Coasts Guard, U.S.
National security guard of state, Chinese Armed Police Force CAPF member.
184. system as described in claim 178, wherein notifying the user:Another user is taking over control.
185. system as described in claim 178, wherein another user enters limited area in the unmanned vehicle
When adapter control.
186. system as described in claim 185, wherein will control after the unmanned vehicle leaves the limited area
System gives back the user.
187. system as described in claim 178, in addition to be the described another of the operation grade with than the user Geng Gao
One user provides less limitation.
188. system as described in claim 159, wherein when the unmanned vehicle is in the environment with lower complexity
During operation, the limitation to unmanned vehicle flight is reduced.
189. system as described in claim 159, wherein adjust or keep based on the user identifier to it is described nobody
The limitation of aircraft flight.
190. system as described in claim 159, wherein adjusting or keeping to institute based on the unmanned vehicle identifier
State the limitation of unmanned vehicle flight.
A kind of 191. methods of operation unmanned vehicle (UAV), methods described include:
The identity of unmanned vehicle is authenticated, wherein the identity of the unmanned vehicle can be unique with other unmanned vehicles
Ground distinguishes;
The identity of user is authenticated, wherein the identity of the user can uniquely distinguish with other users;
By means of one or more processors, assess whether the user is authorized to the operation unmanned vehicle;And
When the user is authorized to the operation unmanned vehicle and the unmanned vehicle and the user are certified,
The user is allowed to operate the unmanned vehicle.
192. method as described in claim 191, wherein being entered by providing correct username and password to the user
Row certification.
193. method as described in claim 191, wherein being recognized by means of the key on remote control machine the user
Card, the user is using the remote control to be communicated with the unmanned vehicle.
194. method as described in claim 193, wherein the key be a part for the mark module of the remote control simultaneously
And it is integrated in the remote control.
195. method as described in claim 191, wherein being carried out by means of the USB flash disk issued by authentication center to the user
Certification, wherein the USB flash disk is coupled to the remote control of the user.
196. method as described in claim 195, wherein the USB flash disk is inserted into the remote control.
197. method as described in claim 191, wherein being authenticated by submitting biological information to the user.
198. method as described in claim 197, wherein the biological information includes finger scan.
199. method as described in claim 197, wherein the biological information includes retina scanning.
200. method as described in claim 191, wherein being authenticated by undergoing face recognition to the user.
201. method as described in claim 191, wherein being authenticated by submitting vocal print to the user.
202. method as described in claim 191, wherein being authenticated by undergoing mutual authentication process to the user.
203. method as described in claim 191, it is additionally included in after being authenticated to the user and collects on the use
The information at family.
204. method as described in claim 203, wherein the information on the user includes the level of skill of the user.
205. method as described in claim 203, wherein the information on the user includes the past flight of the user
Data.
206. method as described in claim 191, wherein by means of the key on the unmanned vehicle machine come to the nothing
People's aircraft is authenticated.
207. method as described in claim 206, wherein the key is a part for mark module, the mark module is
A part for flight control units.
208. method as described in claim 207, wherein the mark module can not separate with the flight control units.
209. method as described in claim 206, wherein also by means of unique unmanned flight on the unmanned vehicle machine
Device identifier is authenticated to the unmanned vehicle.
210. method as described in claim 191, wherein described in being received at authentication center outside the unmanned vehicle machine
The identity of unmanned vehicle and the identity of the user.
211. method as described in claim 210, wherein after being authenticated at the authentication center, establish it is described nobody
Communication connection between aircraft and air traffic control system.
212. method as described in claim 211, wherein the unmanned vehicle via direct access communication channel and with the sky
Guard system communicates.
213. method as described in claim 211, wherein the unmanned vehicle via indirect communication channel and with the sky
Guard system communicates.
214. method as described in claim 211, wherein the unmanned vehicle via user or the user by being grasped
The remote control of work then communicates in carrying out with the air traffic control system.
215. method as described in claim 211, wherein the unmanned vehicle by via it is one or more other nobody
Aircraft then communicates in carrying out with the air traffic control system.
216. method as described in claim 211, wherein allowing traffic pipe of the unmanned vehicle to the air traffic control system
Manage module application resource.
217. method as described in claim 211, wherein the resource includes air route and period.
218. method as described in claim 211, wherein the resource is including one or more in the following:Sensing with
Avoid auxiliary, the access to one or more geography fence equipment, the access to battery station, the access to fuel station or to base
Stand and/or stop at access.
219. method as described in claim 211, wherein the traffic administration module records one of the unmanned vehicle
Or multiple flight plans.
220. method as described in claim 211, wherein allowing the unmanned vehicle application to the unmanned vehicle
The modification of predetermined flight.
221. method as described in claim 210, wherein after being authenticated at the authentication center, establish it is described nobody
Communication connection between aircraft and one or more geography fence equipment.
222. method as described in claim 210, wherein after being authenticated at the authentication center, establish it is described nobody
Communication connection between aircraft and one or more certified intermediates.
223. method as described in claim 222, wherein the certified intermediate is another certified unmanned flight
Device or certified geography fence equipment.
224. method as described in claim 191, in addition to when the user uncommitted operation unmanned vehicle,
The user is not allowed to operate the unmanned vehicle.
225. method as described in claim 191, in addition to when the user uncommitted operation unmanned vehicle,
Only allow in a limited manner to operate the unmanned vehicle.
226. method as described in claim 191, in addition to when the user uncommitted operation unmanned vehicle,
Selected opening position is only allowed in operate the unmanned vehicle.
227. method as described in claim 191, wherein only described user is authorized to the operation unmanned vehicle.
228. method as described in claim 191, plurality of user are authorized to the operation unmanned vehicle.
229. method as described in claim 191, wherein before allowing the unmanned vehicle to take off to it is described nobody fly
Row device is authenticated.
230. method as described in claim 191, wherein entering before allowing the unmanned vehicle to take off to the user
Row certification.
231. method as described in claim 191, in addition to when the unmanned vehicle is in the environment with lower complexity
During middle operation, the limitation to unmanned vehicle flight is reduced.
232. method as described in claim 191, in addition to the identity based on the unmanned vehicle and adjust or keep pair
The limitation of the unmanned vehicle flight.
233. method as described in claim 191, in addition to the identity based on the user and adjust or keep to the nothing
The limitation of people's aircraft flight.
A kind of 234. non-transient computer-readable medias for including the programmed instruction for being used to operate unmanned vehicle (UAV), it is described
Computer-readable medium includes:
For the programmed instruction being authenticated to the identity of unmanned vehicle, wherein the identity of the unmanned vehicle can be with other
Unmanned vehicle uniquely distinguishes;
For the programmed instruction being authenticated to the identity of user, wherein the identity of the user can be uniquely regional with other users
Separate;
Whether it is authorized to the program of the operation unmanned vehicle for assessing the user by one or more processors
Instruction;And
For operating the unmanned vehicle and the unmanned vehicle and the user when the user is authorized to and all being recognized
The programmed instruction for allowing the user to operate the unmanned vehicle during card.
235. non-transient computer-readable media as described in claim 234, wherein by providing correct user name and close
Code is authenticated to the user.
236. non-transient computer-readable media as described in claim 234, wherein being come by means of the key on remote control machine
The user is authenticated, the user is using the remote control to be communicated with the unmanned vehicle.
237. non-transient computer-readable media as described in claim 236, wherein the key is the mark of the remote control
Know a part for module and be integrated in the remote control.
238. non-transient computer-readable media as described in claim 234, wherein by means of the USB flash disk issued by authentication center
To be authenticated to the user, wherein the USB flash disk is coupled to the remote control of the user.
239. non-transient computer-readable media as described in claim 238, wherein the USB flash disk is inserted into the remote control
In.
240. non-transient computer-readable media as described in claim 234, wherein by submit biological information come pair
The user is authenticated.
241. non-transient computer-readable media as described in claim 240, wherein the biological information includes fingerprint
Scanning.
242. non-transient computer-readable media as described in claim 240, wherein the biological information includes view
Film scans.
243. non-transient computer-readable media as described in claim 234, wherein by undergoing face recognition come to described
User is authenticated.
244. non-transient computer-readable media as described in claim 234, wherein by submitting vocal print come to the user
It is authenticated.
245. non-transient computer-readable media as described in claim 234, wherein by undergo mutual authentication process come pair
The user is authenticated.
246. non-transient computer-readable media as described in claim 234, in addition to for recognizing to the user
The programmed instruction of the information on the user is collected after card.
247. non-transient computer-readable media as described in claim 246, wherein the described information bag on the user
Include the level of skill of the user.
248. non-transient computer-readable media as described in claim 246, wherein the described information bag on the user
Include the past flying quality of the user.
249. non-transient computer-readable media as described in claim 234, wherein by means of on the unmanned vehicle machine
Key the unmanned vehicle is authenticated.
250. non-transient computer-readable media as described in claim 249, wherein the key is one of mark module
Point, the mark module is a part for flight control units.
251. non-transient computer-readable media as described in claim 250, wherein the mark module can not fly with described
Row control unit separates.
252. non-transient computer-readable media as described in claim 249, wherein also by means of the unmanned vehicle machine
On unique unmanned vehicle identifier the unmanned vehicle is authenticated.
253. non-transient computer-readable media as described in claim 234, wherein recognizing outside the unmanned vehicle machine
The identity of the unmanned vehicle and the identity of the user are received at card center.
254. non-transient computer-readable media as described in claim 253, wherein being authenticated at the authentication center
Afterwards, the communication connection established between the unmanned vehicle and air traffic control system.
255. non-transient computer-readable media as described in claim 254, wherein the unmanned vehicle is via directly logical
Believe channel and communicated with the air traffic control system.
256. non-transient computer-readable media as described in claim 254, wherein the unmanned vehicle is via a connection
Believe channel and communicated with the air traffic control system.
257. non-transient computer-readable media as described in claim 254, wherein the unmanned vehicle by via with
Family or the remote control operated by the user then communicate in carrying out with the air traffic control system.
258. non-transient computer-readable media as described in claim 254, wherein the unmanned vehicle passes through via one
Other individual or multiple unmanned vehicles then communicate in carrying out with the air traffic control system.
259. non-transient computer-readable media as described in claim 254, wherein allowing the unmanned vehicle to described
The traffic administration module application resource of air traffic control system.
260. non-transient computer-readable media as described in claim 259, wherein the resource include air route and when
Between section.
261. non-transient computer-readable media as described in claim 259, wherein the resource is included in the following
It is one or more:Sensing with avoid auxiliary, the access to one or more geography fence equipment, the access to battery station, to fire
Expect the access at station or to the access at base station and/or stop.
262. non-transient computer-readable media as described in claim 259, wherein described in traffic administration module record
One or more flight plans of unmanned vehicle.
263. non-transient computer-readable media as described in claim 259, wherein allowing the unmanned vehicle application pair
The modification of the predetermined flight of the unmanned vehicle.
264. non-transient computer-readable media as described in claim 254, wherein being authenticated at the authentication center
Afterwards, the communication connection established between the unmanned vehicle and one or more geography fence equipment.
265. non-transient computer-readable media as described in claim 254, wherein being authenticated at the authentication center
Afterwards, the communication connection established between the unmanned vehicle and one or more certified intermediates.
266. non-transient computer-readable media as described in claim 265, wherein the certified intermediate is another
Certified unmanned vehicle or certified geography fence equipment.
267. non-transient computer-readable media as described in claim 234, in addition to it is uncommitted for working as the user
The programmed instruction for not allowing the user to operate the unmanned vehicle when operating the unmanned vehicle.
268. non-transient computer-readable media as described in claim 234, in addition to it is uncommitted for working as the user
Only allow the programmed instruction operated in a limited manner to the unmanned vehicle when operating the unmanned vehicle.
269. non-transient computer-readable media as described in claim 234, in addition to it is uncommitted for working as the user
The programmed instruction that selected opening position is operated to the unmanned vehicle is only allowed in when operating the unmanned vehicle.
270. non-transient computer-readable media as described in claim 234, wherein only described user is authorized to described in operation
Unmanned vehicle.
271. non-transient computer-readable media as described in claim 234, plurality of user are authorized to the operation nothing
People's aircraft.
272. non-transient computer-readable media as described in claim 234, wherein allowing the unmanned vehicle to take off
The unmanned vehicle is authenticated before.
273. non-transient computer-readable media as described in claim 234, wherein allowing the unmanned vehicle to take off
The user is authenticated before.
274. non-transient computer-readable media as described in claim 234, in addition to for existing when the unmanned vehicle
When being operated in the environment with lower complexity, the programmed instruction of the limitation to unmanned vehicle flight is reduced.
275. non-transient computer-readable media as described in claim 234, in addition to for being based on the unmanned vehicle
Identity and adjust or keep to the unmanned vehicle flight limitation programmed instruction.
276. non-transient computer-readable media as described in claim 234, in addition to it is used for the identity based on the user
And adjust or keep the programmed instruction of the limitation to unmanned vehicle flight.
A kind of 277. unmanned vehicle (UAV) Verification Systems, including:
One or more processors, it is either individually or collectively used for:
The identity of unmanned vehicle is authenticated, wherein the identity of the unmanned vehicle can be unique with other unmanned vehicles
Ground distinguishes;
The identity of user is authenticated, wherein the identity of the user can uniquely distinguish with other users;
Assess whether the user is authorized to the operation unmanned vehicle;And
When the user is authorized to the operation unmanned vehicle and the unmanned vehicle and the user are certified,
Transmission signal is to allow the user to operate the unmanned vehicle.
278. system as described in claim 277, wherein being entered by providing correct username and password to the user
Row certification.
279. system as described in claim 277, wherein being recognized by means of the key on remote control machine the user
Card, the user is using the remote control to be communicated with the unmanned vehicle.
280. system as described in claim 279, wherein the key be a part for the mark module of the remote control simultaneously
And it is integrated in the remote control.
281. system as described in claim 277, wherein being carried out by means of the USB flash disk issued by authentication center to the user
Certification, wherein the USB flash disk is coupled to the remote control of the user.
282. system as described in claim 281, wherein the USB flash disk is inserted into the remote control.
283. system as described in claim 277, wherein being authenticated by submitting biological information to the user.
284. system as described in claim 284, wherein the biological information includes finger scan.
285. system as described in claim 284, wherein the biological information includes retina scanning.
286. system as described in claim 277, wherein being authenticated by undergoing face recognition to the user.
287. system as described in claim 277, wherein being authenticated by submitting vocal print to the user.
288. system as described in claim 277, wherein being authenticated by undergoing mutual authentication process to the user.
289. system as described in claim 277, wherein being collected after being authenticated to the user on the user
Information.
290. system as described in claim 289, wherein the information on the user includes the level of skill of the user.
291. system as described in claim 289, wherein the information on the user includes the past flight of the user
Data.
292. system as described in claim 277, wherein by means of the key on the unmanned vehicle machine come to the nothing
People's aircraft is authenticated.
293. system as described in claim 292, wherein the key is a part for mark module, the mark module is
A part for flight control units.
294. system as described in claim 293, wherein the mark module can not separate with the flight control units.
295. system as described in claim 292, wherein also by means of unique unmanned flight on the unmanned vehicle machine
Device identifier is authenticated to the unmanned vehicle.
296. system as described in claim 277, wherein described in being received at authentication center outside the unmanned vehicle machine
The identity of unmanned vehicle and the identity of the user.
297. system as described in claim 296, wherein after being authenticated at the authentication center, establish it is described nobody
Communication connection between aircraft and air traffic control system.
298. system as described in claim 297, wherein the unmanned vehicle via direct access communication channel and with the sky
Guard system communicates.
299. system as described in claim 297, wherein the unmanned vehicle via indirect communication channel and with the sky
Guard system communicates.
300. system as described in claim 297, wherein the unmanned vehicle via user or the user by being grasped
The remote control of work then communicates in carrying out with the air traffic control system.
301. system as described in claim 297, wherein the unmanned vehicle by via it is one or more other nobody
Aircraft then communicates in carrying out with the air traffic control system.
302. system as described in claim 297, wherein allowing traffic pipe of the unmanned vehicle to the air traffic control system
Manage module application resource.
303. system as described in claim 302, wherein the resource includes air route and period.
304. system as described in claim 302, wherein the resource is including one or more in the following:Sensing with
Avoid auxiliary, the access to one or more geography fence equipment, the access to battery station, the access to fuel station or to base
Stand and/or stop at access.
305. system as described in claim 302, wherein the traffic administration module records one of the unmanned vehicle
Or multiple flight plans.
306. system as described in claim 302, wherein allowing the unmanned vehicle application to the unmanned vehicle
The modification of predetermined flight.
307. system as described in claim 296, wherein after being authenticated at the authentication center, establish it is described nobody
Communication connection between aircraft and one or more geography fence equipment.
308. system as described in claim 296, wherein after being authenticated at the authentication center, establish it is described nobody
Communication connection between aircraft and one or more certified intermediates.
309. system as described in claim 308, wherein the certified intermediate is another certified unmanned flight
Device or certified geography fence equipment.
310. system as described in claim 277, when the user is uncommitted operates the unmanned vehicle, do not allow
The user operates to the unmanned vehicle.
311. system as described in claim 277, wherein when the user uncommitted operation unmanned vehicle, only
Allow in a limited manner to operate the unmanned vehicle.
312. system as described in claim 277, wherein when the user uncommitted operation unmanned vehicle, permit
Perhaps the unmanned vehicle is operated in selected opening position.
313. system as described in claim 277, wherein only described user is authorized to the operation unmanned vehicle.
314. system as described in claim 277, plurality of user are authorized to the operation unmanned vehicle.
315. system as described in claim 277, wherein before allowing the unmanned vehicle to take off to it is described nobody fly
Row device is authenticated.
316. system as described in claim 277, wherein entering before allowing the unmanned vehicle to take off to the user
Row certification.
317. system as described in claim 277, wherein when the unmanned vehicle is in the environment with lower complexity
During operation, the limitation to unmanned vehicle flight is reduced.
318. system as described in claim 277, wherein the identity based on the unmanned vehicle and adjust or keep to institute
State the limitation of unmanned vehicle flight.
319. system as described in claim 277, wherein the identity based on the user and adjust or keep to it is described nobody
The limitation of aircraft flight.
A kind of 320. methods for the authentication level for determining the operation for unmanned vehicle (UAV), methods described include:
Receive the context information on the unmanned vehicle;
Using one or more processors, assessed based on the context information to the unmanned vehicle or the unmanned flight
The certification degree of the user of device;
The certification of the unmanned vehicle or the user is realized according to the certification degree;And
When completing the certification degree, it is allowed to which the user operates to the unmanned vehicle.
321. method as described in claim 320, wherein the certification degree is included not to the unmanned vehicle or described
User is authenticated.
322. method as described in claim 320, wherein the certification is included to the unmanned vehicle and the user
Certification.
323. method as described in claim 320, wherein the certification degree, which is selected from, is directed to the unmanned vehicle or described
Multiple options of the certification degree of user.
324. method as described in claim 320, wherein the context information includes operating the unmanned flight in it
The environment of device.
325. method as described in claim 324, wherein the environment is rural areas.
326. method as described in claim 324, wherein the environment is urban area.
327. method as described in claim 324, wherein when the unmanned vehicle is located in urban area when ratio when described
Unmanned flight's machine is located at the certification degree that needs are higher when in rural areas.
328. method as described in claim 324, wherein when the unmanned vehicle is located at the ring with the larger density of population
, it is necessary to higher certification degree when in border.
329. method as described in claim 324, wherein when the unmanned vehicle is located at higher environment complexity
, it is necessary to higher certification degree when in environment.
330. method as described in claim 320, wherein the context information includes the position of the unmanned vehicle.
331. method as described in claim 330, wherein the context information includes the position for the unmanned vehicle
Geographical flight restriction.
332. method as described in claim 320, wherein the context information include to operate the unmanned vehicle when
Between.
333. method as described in claim 320, wherein the context information includes the identity of user.
334. method as described in claim 333, wherein the identity of the user indicates user type.
335. method as described in claim 333, wherein the identity of the user indicates the level of skill of the user.
336. method as described in claim 320, wherein the context information includes the type of the unmanned vehicle.
337. method as described in claim 320, wherein the context information includes what is performed by the unmanned vehicle
The complexity of task.
338. method as described in claim 320, wherein the context information includes the presence of wireless signal in the region
Or it is not present.
339. method as described in claim 320, wherein when the context information indicates higher hacker attacks risk,
Need higher certification degree.
340. method as described in claim 320, wherein being produced when the context information indicates to the wireless signal in region
, it is necessary to higher certification degree during the larger possibility of raw interference.
341. method as described in claim 320, wherein when the context information indicates flight restriction higher in region
, it is necessary to higher certification degree during degree.
342. method as described in claim 320, wherein one or more of processors are located at the unmanned vehicle machine
On.
343. method as described in claim 342, wherein one or more of processors are outside the unmanned vehicle machine
Air traffic control system receive information, wherein the described information from the air traffic control system is evaluated to determine the certification degree.
344. method as described in claim 320, wherein one or more of processors are located at the unmanned vehicle machine
Outside.
345. it is a kind of include the programmed instruction that are used to determine the authentication level for operating unmanned vehicle (UAV) it is non-transient based on
Calculation machine computer-readable recording medium, the computer-readable medium include:
For receiving the programmed instruction of the context information on the unmanned vehicle;
For assessing the certification journey of the user to the unmanned vehicle or the unmanned vehicle based on the context information
The programmed instruction of degree;
For realizing the programmed instruction of the certification of the unmanned vehicle or the user according to the certification degree;And
For providing the signal for allowing the user to operate the unmanned vehicle when completing the certification degree
Programmed instruction.
346. non-transient computer-readable media as described in claim 345, wherein the certification degree is included not to described
Unmanned vehicle or the user are authenticated.
347. non-transient computer-readable media as described in claim 345, wherein the certification include to it is described nobody fly
Row device and the certification of the user.
348. non-transient computer-readable media as described in claim 345, wherein the certification degree is selected from for described
Multiple options of the certification degree of unmanned vehicle or the user.
349. non-transient computer-readable media as described in claim 345, wherein the context information include will be in it
Operate the environment of the unmanned vehicle.
350. non-transient computer-readable media as described in claim 349, wherein the environment is rural areas.
351. non-transient computer-readable media as described in claim 349, wherein the environment is urban area.
352. non-transient computer-readable media as described in claim 349, wherein when the unmanned vehicle is located at city
Than needing higher certification degree when the unmanned vehicle is located in rural areas when in region.
353. non-transient computer-readable media as described in claim 349, wherein having when the unmanned vehicle is located at
, it is necessary to higher certification degree when in the environment of the larger density of population.
354. non-transient computer-readable media as described in claim 349, wherein having when the unmanned vehicle is located at
, it is necessary to higher certification degree when in the environment of higher environment complexity.
355. non-transient computer-readable media as described in claim 345, wherein the context information include it is described nobody
The position of aircraft.
356. non-transient computer-readable media as described in claim 355, wherein the context information is included for described
The geographical flight restriction of the position of unmanned vehicle.
357. non-transient computer-readable media as described in claim 345, wherein the context information includes operating institute
State the time of unmanned vehicle.
358. non-transient computer-readable media as described in claim 345, wherein the context information includes the body of user
Part.
359. non-transient computer-readable media as described in claim 358, wherein the identity of the user indicates user
Type.
360. non-transient computer-readable media as described in claim 358, wherein the identity of the user indicate it is described
The level of skill of user.
361. non-transient computer-readable media as described in claim 345, wherein the context information include it is described nobody
The type of aircraft.
362. non-transient computer-readable media as described in claim 345, wherein the context information include will be by described
The complexity for the task that unmanned vehicle performs.
363. non-transient computer-readable media as described in claim 345, wherein the context information includes the region
The existence or non-existence of middle wireless signal.
364. non-transient computer-readable media as described in claim 345, wherein when the context information indicate it is higher
Hacker attacks risk when, it is necessary to higher certification degree.
365. non-transient computer-readable media as described in claim 345, wherein when the context information is indicated to area
, it is necessary to higher certification degree during the larger possibility of the wireless signal generation interference in domain.
366. non-transient computer-readable media as described in claim 345, wherein when the context information indicates region
In higher flight restriction degree when, it is necessary to higher certification degree.
367. non-transient computer-readable media as described in claim 345, wherein it is described assess occur it is described nobody fly
On row device machine.
368. non-transient computer-readable media as described in claim 367, wherein one or more processors are from the nothing
Air traffic control system receive information outside people's aircraft machine, wherein the described information from the air traffic control system be evaluated to determine it is described
Certification degree.
369. non-transient computer-readable media as described in claim 345, wherein it is described assess occur it is described nobody fly
Outside row device machine.
A kind of 370. unmanned vehicle (UAV) Verification Systems, including:
One or more processors, it is either individually or collectively used for:
Receive the context information on the unmanned vehicle;
The certification degree of user to the unmanned vehicle or the unmanned vehicle is assessed based on the context information;With
And
Certification to the unmanned vehicle or the user is realized according to the certification degree.
371. system as described in claim 370, wherein the certification degree is included not to the unmanned vehicle or described
User is authenticated.
372. system as described in claim 370, wherein the certification is included to the unmanned vehicle and the user
Certification.
373. system as described in claim 370, wherein the certification degree, which is selected from, is directed to the unmanned vehicle or described
Multiple options of the certification degree of user.
374. system as described in claim 370, wherein the context information includes operating the unmanned flight in it
The environment of device.
375. system as described in claim 374, wherein the environment is rural areas.
376. system as described in claim 374, wherein the environment is urban area.
377. system as described in claim 374, wherein when the unmanned vehicle is located in urban area when ratio when described
Unmanned vehicle is located at the certification degree that needs are higher when in rural areas.
378. system as described in claim 374, wherein when the unmanned vehicle is located at the ring with the larger density of population
, it is necessary to higher certification degree when in border.
379. system as described in claim 374, wherein when the unmanned vehicle is located at higher environment complexity
, it is necessary to higher certification degree when in environment.
380. system as described in claim 370, wherein the context information includes the position of the unmanned vehicle.
381. system as described in claim 380, wherein the context information includes the position for the unmanned vehicle
Geographical flight restriction.
382. system as described in claim 370, wherein the context information include to operate the unmanned vehicle when
Between.
383. system as described in claim 370, wherein the context information includes the identity of user.
384. system as described in claim 383, wherein the identity of the user indicates user type.
385. system as described in claim 383, wherein the identity of the user indicates the level of skill of the user.
386. system as described in claim 370, wherein the context information includes the type of the unmanned vehicle.
387. system as described in claim 370, wherein the context information includes what is performed by the unmanned vehicle
The complexity of task.
388. system as described in claim 370, wherein the context information includes the presence of wireless signal in the region
Or it is not present.
389. system as described in claim 370, wherein when the context information indicates higher hacker attacks risk,
Need higher certification degree.
390. system as described in claim 370, wherein being produced when the context information indicates to the wireless signal in region
, it is necessary to higher certification degree during the larger possibility of raw interference.
391. system as described in claim 370, wherein when the context information indicates flight restriction higher in region
, it is necessary to higher certification degree during degree.
392. system as described in claim 370, wherein one or more of processors are located at the unmanned vehicle machine
On.
393. system as described in claim 392, wherein one or more of processors are outside the unmanned vehicle machine
Air traffic control system receive information, wherein assessing the information from the air traffic control system to determine the certification degree.
394. system as described in claim 370, wherein one or more of processors are located at the unmanned vehicle machine
Outside.
A kind of 395. methods for the air traffic control grade for determining the operation for unmanned vehicle (UAV), methods described include:
Using one or more processors, the certification journey of the user to the unmanned vehicle or the unmanned vehicle is assessed
Degree;
Certification to the unmanned vehicle or the user is realized according to the certification degree;
One group of air traffic control is generated based on the certification degree;And
The operation of the unmanned vehicle is realized according to one group of air traffic control.
396. method as described in claim 395, wherein when the certification degree is relatively low, generation is restricted higher one group
Air traffic control.
397. method as described in claim 395, wherein when the certification degree is higher, restricted relatively low one group of generation
Air traffic control.
398. method as described in claim 395, wherein the certification degree is included not to the unmanned vehicle or described
User is authenticated.
399. method as described in claim 395, wherein the certification is included to the unmanned vehicle and the user
Certification.
400. method as described in claim 395, wherein the certification degree, which is selected from, is directed to the unmanned vehicle or described
Multiple options of the certification degree of user.
401. method as described in claim 395, wherein by selecting one group of air traffic control from multigroup air traffic control
And generate one group of air traffic control.
402. method as described in claim 395, wherein according to the certification degree to the unmanned vehicle and the use
Family is authenticated.
403. method as described in claim 395, wherein one or more of processors are located at the unmanned vehicle machine
On.
404. method as described in claim 403, wherein one or more of processors are outside the unmanned vehicle machine
Air traffic control system receive information, wherein the described information from the air traffic control system is evaluated to determine one group of tof tube
System.
405. method as described in claim 395, wherein one or more of processors are located at the unmanned vehicle machine
Outside.
406. method as described in claim 395, wherein the user of the unmanned vehicle, which sends, realizes the unmanned flight
One or more orders of the operation of device.
407. method as described in claim 406, wherein sending the order by means of remote control.
408. it is a kind of include the programmed instruction that are used for determining to be directed to the air traffic control grade of unmanned vehicle (UAV) it is non-transient based on
Calculation machine computer-readable recording medium, the computer-readable medium include:
For assessing to the unmanned vehicle or the programmed instruction of the certification degree of the user of the unmanned vehicle;
For realizing the programmed instruction of the certification to the unmanned vehicle or the user according to the certification degree;
For generating the programmed instruction of one group of air traffic control based on the certification degree;And
Program for providing the signal for allowing to be operated to the unmanned vehicle according to one group of air traffic control refers to
Order.
409. non-transient computer-readable media as described in claim 408, wherein when the certification degree is relatively low, generation
Restricted one group of higher air traffic control.
410. non-transient computer-readable media as described in claim 408, wherein when the certification degree is higher, generation
Restricted one group of relatively low air traffic control.
411. non-transient computer-readable media as described in claim 408, wherein the certification degree is included not to described
Unmanned vehicle or the user are authenticated.
412. non-transient computer-readable media as described in claim 408, wherein the certification include to it is described nobody fly
Row device and the certification of the user.
413. non-transient computer-readable media as described in claim 408, wherein the certification degree is selected from for described
Multiple options of the certification degree of unmanned vehicle or the user.
414. non-transient computer-readable media as described in claim 408, wherein by being selected from multigroup air traffic control
One group of air traffic control and generate one group of air traffic control.
415. non-transient computer-readable media as described in claim 408, wherein according to the certification degree to the nothing
People's aircraft and the user are authenticated.
416. non-transient computer-readable media as described in claim 408, wherein it is described assess occur it is described nobody fly
On row device machine.
417. non-transient computer-readable media as described in claim 416, wherein one or more of the unmanned vehicle
Air traffic control system receive information of the individual processor outside the unmanned vehicle machine, wherein the described information from the air traffic control system
It is evaluated to determine one group of air traffic control.
418. non-transient computer-readable media as described in claim 408, wherein it is described assess occur it is described nobody fly
Outside row device machine.
419. non-transient computer-readable media as described in claim 408, wherein the user of the unmanned vehicle sends
Realize one or more orders of the operation of the unmanned vehicle.
420. non-transient computer-readable media as described in claim 419, wherein sending the order by means of remote control.
A kind of 421. unmanned vehicle (UAV) Verification Systems, including:
One or more processors, it is either individually or collectively used for:
Assess to the unmanned vehicle or the certification degree of the user of the unmanned vehicle;
Certification to the unmanned vehicle or the user is realized according to the certification degree;And
One group of air traffic control is generated based on the certification degree.
422. system as described in claim 421, wherein when the certification degree is relatively low, generation is restricted higher one group
Air traffic control.
423. system as described in claim 421, wherein when the certification degree is higher, restricted relatively low one group of generation
Air traffic control.
424. system as described in claim 421, wherein the certification degree is included not to the unmanned vehicle or described
User is authenticated.
425. system as described in claim 421, wherein the certification is included to the unmanned vehicle and the user
Certification.
426. system as described in claim 421, wherein the certification degree, which is selected from, is directed to the unmanned vehicle or described
Multiple options of the certification degree of user.
427. system as described in claim 421, wherein by selecting one group of air traffic control from multigroup air traffic control
And generate one group of air traffic control.
428. system as described in claim 421, wherein according to the certification degree to the unmanned vehicle and the use
Family is authenticated.
429. system as described in claim 421, wherein one or more of processors are located at the unmanned vehicle machine
On.
430. system as described in claim 429, wherein one or more of processors are outside the unmanned vehicle machine
Air traffic control system receive information, wherein the described information from the air traffic control system is evaluated to determine one group of tof tube
System.
431. system as described in claim 421, wherein one or more of processors are located at the unmanned vehicle machine
Outside.
432. system as described in claim 421, wherein the user of the unmanned vehicle, which sends, realizes the unmanned flight
One or more orders of the operation of device.
433. system as described in claim 432, wherein sending the order by means of remote control.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2015/075625 WO2016154948A1 (en) | 2015-03-31 | 2015-03-31 | Authentication systems and methods for identification of authorized participants |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107615358A true CN107615358A (en) | 2018-01-19 |
Family
ID=57004681
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201580078198.8A Pending CN107615358A (en) | 2015-03-31 | 2015-03-31 | For identifying the Verification System and method of authorized participant |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP3158553B1 (en) |
JP (1) | JP6431186B2 (en) |
CN (1) | CN107615358A (en) |
DK (1) | DK3158553T3 (en) |
WO (1) | WO2016154948A1 (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108304877A (en) * | 2018-02-02 | 2018-07-20 | 电子科技大学 | A kind of physical layer channel authentication method based on machine learning |
CN108566240A (en) * | 2018-03-28 | 2018-09-21 | 西安电子科技大学 | Networking Verification System and method between a kind of star suitable for double layer minipellet |
CN108696517A (en) * | 2018-05-08 | 2018-10-23 | 山东渔翁信息技术股份有限公司 | A kind of safe communication method, the apparatus and system of unmanned vehicle information |
CN108833961A (en) * | 2018-06-25 | 2018-11-16 | 北京京东尚科信息技术有限公司 | Obtain method, server and the system of flight record data |
CN110555295A (en) * | 2018-06-01 | 2019-12-10 | 通用电气航空系统有限公司 | system and method for reliable command in a vehicle |
CN110720123A (en) * | 2018-10-31 | 2020-01-21 | 深圳市大疆创新科技有限公司 | Control method and control equipment for mobile platform |
CN110770728A (en) * | 2018-10-29 | 2020-02-07 | 深圳市大疆创新科技有限公司 | Unmanned aerial vehicle control method, unmanned aerial vehicle and terminal for controlling unmanned aerial vehicle |
CN111431854A (en) * | 2020-02-23 | 2020-07-17 | 中国科学院信息工程研究所 | Wi-Fi received signal strength-based double-factor authentication method and electronic device |
CN111679271A (en) * | 2020-06-15 | 2020-09-18 | 杭州海康威视数字技术股份有限公司 | Target tracking method, target tracking device, monitoring system and storage medium |
CN114093201A (en) * | 2020-08-24 | 2022-02-25 | 中移(成都)信息通信科技有限公司 | Flight equipment management method, device, equipment and storage medium |
US20220074744A1 (en) * | 2015-12-31 | 2022-03-10 | Skydio, Inc. | Unmanned Aerial Vehicle Control Point Selection System |
US20220224695A1 (en) * | 2018-12-18 | 2022-07-14 | At&T Intellectual Property I, L.P. | Anchoring Client Devices for Network Service Access Control |
CN115564315A (en) * | 2022-11-28 | 2023-01-03 | 苏州维伟思医疗科技有限公司 | Unmanned aerial vehicle control method, server, control terminal and storage medium |
WO2024020856A1 (en) * | 2022-07-27 | 2024-02-01 | Oppo广东移动通信有限公司 | Transmission method and apparatus for authentication information, and device and medium |
WO2024066433A1 (en) * | 2022-09-30 | 2024-04-04 | 南京壮大智能科技研究院有限公司 | Unmanned aerial vehicle remote power switch apparatus having identity information identification function |
Families Citing this family (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP6423521B2 (en) | 2015-03-31 | 2018-11-14 | エスゼット ディージェイアイ テクノロジー カンパニー リミテッドSz Dji Technology Co.,Ltd | System for controlling unmanned aerial vehicles |
JP6459014B2 (en) | 2015-03-31 | 2019-01-30 | エスゼット ディージェイアイ テクノロジー カンパニー リミテッドSz Dji Technology Co.,Ltd | Geo-fencing device |
WO2016201359A1 (en) | 2015-06-12 | 2016-12-15 | Foina Aislan Gomide | A low altitude aircraft identification system |
US20190149322A1 (en) * | 2015-06-12 | 2019-05-16 | Airspace Systems, Inc. | Verifying identity identifier transmitted by an aerial vehicle |
US20220392353A1 (en) * | 2016-02-08 | 2022-12-08 | Skydio, Inc. | Unmanned aerial vehicle privacy controls |
US10762795B2 (en) | 2016-02-08 | 2020-09-01 | Skydio, Inc. | Unmanned aerial vehicle privacy controls |
WO2018071377A1 (en) * | 2016-10-11 | 2018-04-19 | Smartsky Networks, Llc | Apparatus, method and system for providing pilot advisories on trajectory management using continuous replanning of dynamically interacting trajectories for optimal economic and safety outcomes |
KR20190113986A (en) | 2017-03-21 | 2019-10-08 | 에스지 디제이아이 테크놀러지 코., 엘티디 | Monitoring method and system |
US10389432B2 (en) | 2017-06-22 | 2019-08-20 | At&T Intellectual Property I, L.P. | Maintaining network connectivity of aerial devices during unmanned flight |
US11676299B2 (en) * | 2017-08-07 | 2023-06-13 | Ford Global Technologies, Llc | Locating a vehicle using a drone |
EP3665913A4 (en) * | 2017-08-11 | 2021-06-23 | Lenovo (Beijing) Limited | Subscription information configuration |
CN110020035B (en) * | 2017-09-06 | 2023-05-12 | 腾讯科技(北京)有限公司 | Data identification method and device, storage medium and electronic device |
GB201715760D0 (en) | 2017-09-28 | 2017-11-15 | A P Møller Mærsk As | A method and system for operating a ship |
GB2562813B (en) | 2017-10-16 | 2019-04-24 | Matthew Russell Iain | Detecting and identifying unmanned aerial vehicles |
US10931687B2 (en) * | 2018-02-20 | 2021-02-23 | General Electric Company | Cyber-attack detection, localization, and neutralization for unmanned aerial vehicles |
WO2019181897A1 (en) * | 2018-03-19 | 2019-09-26 | 本田技研工業株式会社 | Moving body management system, method for controlling same, management server, and autonomous moving body |
CN111902852B (en) * | 2018-04-05 | 2023-02-17 | 瑞典爱立信有限公司 | Method for controlling an unlicensed over-the-air UE |
US10860953B2 (en) | 2018-04-27 | 2020-12-08 | DISH Technologies L.L.C. | IoT drone fleet |
KR102050230B1 (en) * | 2018-06-29 | 2019-11-29 | 순천향대학교 산학협력단 | A method for verifying drones in Industrial Internet of Things using Petri net modeling |
CN110717154A (en) * | 2018-07-11 | 2020-01-21 | 中国银联股份有限公司 | Method and device for processing characteristics of motion trail and computer storage medium |
US11279467B2 (en) * | 2018-10-17 | 2022-03-22 | Subaru Corporation | Aircraft control system |
US11095642B2 (en) * | 2018-11-07 | 2021-08-17 | Cylance Inc. | Verifying user identity through human / computer interaction |
JP7195117B2 (en) * | 2018-11-14 | 2022-12-23 | エヌ・ティ・ティ・コムウェア株式会社 | Information display system, information display method and information display program |
WO2020170332A1 (en) * | 2019-02-19 | 2020-08-27 | 賢一 金子 | Unmanned flying device, management device, and flight management method |
CN110087205B (en) * | 2019-04-19 | 2021-08-27 | 上海救要救信息科技有限公司 | Method and device for acquiring basic parameters of rescued person |
JP7276072B2 (en) * | 2019-10-22 | 2023-05-18 | 株式会社デンソー | Remote support system, in-vehicle device, remote support method, and remote support program |
KR102314597B1 (en) * | 2019-12-03 | 2021-10-20 | (주)디큐 | Smart Toy System for Education Using Drones Which Move Within the Predetermined Flight Range |
US20220415190A1 (en) * | 2019-12-04 | 2022-12-29 | Ge Aviation Systems Llc | Apparatus, systems, and method of providing an unmanned & manned air traffic management master services architecture |
EP3883235A1 (en) | 2020-03-17 | 2021-09-22 | Aptiv Technologies Limited | Camera control modules and methods |
KR102308700B1 (en) * | 2020-04-20 | 2021-10-05 | 동국대학교 산학협력단 | Tracking drone that can track whether drone is permitted to fly within restricted area and operating method thereof |
KR102414986B1 (en) * | 2020-06-25 | 2022-06-29 | 금오공과대학교 산학협력단 | UAV Navigation based on GPS and Improved deep learning Network and UAV system using the same |
US11934981B2 (en) | 2020-10-06 | 2024-03-19 | Dish Network L.L.C. | Systems and methods for drones as a service |
US11840250B2 (en) | 2020-10-26 | 2023-12-12 | Toyota Motor Engineering & Manufacturing North America, Inc. | Methods and systems for informing drivers of vehicle operating functions |
CN112528255A (en) * | 2020-11-27 | 2021-03-19 | 郑州云智信安安全技术有限公司 | Data self-destruction system of USB flash disk with fingerprint identification function |
EP4278639A1 (en) * | 2021-01-15 | 2023-11-22 | Telefonaktiebolaget LM Ericsson (publ) | Limited capability zones for wireless devices |
KR102243810B1 (en) * | 2021-02-08 | 2021-04-23 | 뉴인테크 주식회사 | Caption adding system and method of helicam recording image with position information for filming site |
KR102677838B1 (en) * | 2021-09-10 | 2024-06-25 | 주식회사 로보에셋그리드 | Drone apparatus equipped with a short-range wireless communication module that can collect metering data from a plurality of meters and transmit it to an administrator terminal, and operating method thereof |
KR102658791B1 (en) * | 2021-11-24 | 2024-04-19 | 단국대학교 산학협력단 | 3D flight route recommendation system and method of unmanned aerial vehicle using flight information learning |
CN114783215B (en) * | 2022-04-18 | 2023-05-26 | 中国人民解放军战略支援部队信息工程大学 | Unmanned aerial vehicle clustering method and device and electronic equipment |
FR3146384A1 (en) * | 2023-03-03 | 2024-09-06 | Sita It Services France S.A.S. | COMMUNICATIONS GATEWAY FOR UNMANNED AIRCRAFT PILOTS |
CN117118613B (en) * | 2023-10-18 | 2024-01-02 | 湖北芯擎科技有限公司 | Whole vehicle instrument data security protection method, equipment and readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080255711A1 (en) * | 2006-09-06 | 2008-10-16 | Matos Jeffrey A | Systems and methods for detecting and managing the unauthorized use of a unmanned aircraft |
CN101582205A (en) * | 2009-06-11 | 2009-11-18 | 山东大学 | Method and device for monitoring flying state of low-altitude airspace aerocraft |
CN101833870A (en) * | 2010-05-20 | 2010-09-15 | 无锡汉和航空技术有限公司 | Air safety monitoring method for unmanned aerial vehicle |
US20120022719A1 (en) * | 2006-09-06 | 2012-01-26 | Matos Jeffrey A | Systems and methods for detecting and managing the unauthorized use of an unmanned aircraft |
CN102650883A (en) * | 2011-02-24 | 2012-08-29 | 鸿富锦精密工业(深圳)有限公司 | System and method for controlling unmanned aerial vehicle |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3012398B2 (en) * | 1992-05-25 | 2000-02-21 | 株式会社日立製作所 | Positioning method for multiple moving objects |
JP3294954B2 (en) * | 1994-11-01 | 2002-06-24 | 沖電気工業株式会社 | Mobile delivery control method |
EP1126655A1 (en) * | 2000-02-15 | 2001-08-22 | Siemens Aktiengesellschaft | Method of hardware and software authentication in a network system |
JP2001283400A (en) * | 2000-04-03 | 2001-10-12 | Nec Corp | Unmanned aircraft control system |
JP4057344B2 (en) * | 2002-05-27 | 2008-03-05 | シャープ株式会社 | Information presentation device and information presentation system |
JP4313066B2 (en) * | 2003-03-27 | 2009-08-12 | ヤマハ発動機株式会社 | Unmanned helicopter management system |
JP2010055620A (en) * | 2003-05-28 | 2010-03-11 | Sharp Corp | Application processing apparatus |
JP2008105591A (en) * | 2006-10-26 | 2008-05-08 | Hiroboo Kk | Flight management method of autonomous control unmanned flying object |
CN201655045U (en) * | 2009-07-10 | 2010-11-24 | 贵州盖克无人机有限责任公司 | Unmanned aerial vehicle (UAV) flight anticollision device |
CN101593437A (en) * | 2009-07-10 | 2009-12-02 | 贵州盖克无人机有限责任公司 | A kind of unmanned plane flight collision avoidance method and device |
US8818696B2 (en) * | 2011-03-23 | 2014-08-26 | Ge Aviation Systems Llc | Method and system for aerial vehicle trajectory management |
US8970400B2 (en) * | 2011-05-24 | 2015-03-03 | Verna Ip Holdings, Llc | Unmanned vehicle civil communications systems and methods |
CN102637023A (en) * | 2012-03-23 | 2012-08-15 | 王效波 | Remote unmanned aerial vehicle cluster control method and system based on 3G (the 3rd Generation Telecommunication) and GPRS (General Packet Radio Service) cell phone communication |
US9609284B2 (en) * | 2012-05-22 | 2017-03-28 | Otoy, Inc. | Portable mobile light stage |
JP6187967B2 (en) * | 2013-09-04 | 2017-08-30 | みこらった株式会社 | Defense device and defense system |
-
2015
- 2015-03-31 EP EP15874415.1A patent/EP3158553B1/en not_active Not-in-force
- 2015-03-31 DK DK15874415.1T patent/DK3158553T3/en active
- 2015-03-31 CN CN201580078198.8A patent/CN107615358A/en active Pending
- 2015-03-31 JP JP2017509023A patent/JP6431186B2/en active Active
- 2015-03-31 WO PCT/CN2015/075625 patent/WO2016154948A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080255711A1 (en) * | 2006-09-06 | 2008-10-16 | Matos Jeffrey A | Systems and methods for detecting and managing the unauthorized use of a unmanned aircraft |
US20120022719A1 (en) * | 2006-09-06 | 2012-01-26 | Matos Jeffrey A | Systems and methods for detecting and managing the unauthorized use of an unmanned aircraft |
CN101582205A (en) * | 2009-06-11 | 2009-11-18 | 山东大学 | Method and device for monitoring flying state of low-altitude airspace aerocraft |
CN101833870A (en) * | 2010-05-20 | 2010-09-15 | 无锡汉和航空技术有限公司 | Air safety monitoring method for unmanned aerial vehicle |
CN102650883A (en) * | 2011-02-24 | 2012-08-29 | 鸿富锦精密工业(深圳)有限公司 | System and method for controlling unmanned aerial vehicle |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220074744A1 (en) * | 2015-12-31 | 2022-03-10 | Skydio, Inc. | Unmanned Aerial Vehicle Control Point Selection System |
US11725940B2 (en) * | 2015-12-31 | 2023-08-15 | Skydio, Inc. | Unmanned aerial vehicle control point selection system |
CN108304877A (en) * | 2018-02-02 | 2018-07-20 | 电子科技大学 | A kind of physical layer channel authentication method based on machine learning |
CN108304877B (en) * | 2018-02-02 | 2021-10-08 | 电子科技大学 | Physical layer channel authentication method based on machine learning |
CN108566240B (en) * | 2018-03-28 | 2020-10-27 | 西安电子科技大学 | Inter-satellite networking authentication system and method suitable for double-layer satellite network |
CN108566240A (en) * | 2018-03-28 | 2018-09-21 | 西安电子科技大学 | Networking Verification System and method between a kind of star suitable for double layer minipellet |
CN108696517A (en) * | 2018-05-08 | 2018-10-23 | 山东渔翁信息技术股份有限公司 | A kind of safe communication method, the apparatus and system of unmanned vehicle information |
CN110555295A (en) * | 2018-06-01 | 2019-12-10 | 通用电气航空系统有限公司 | system and method for reliable command in a vehicle |
CN110555295B (en) * | 2018-06-01 | 2022-06-07 | 通用电气航空系统有限公司 | System and method for reliable command in a vehicle |
CN108833961B (en) * | 2018-06-25 | 2021-01-26 | 北京京东尚科信息技术有限公司 | Method, server and system for acquiring flight record data |
CN108833961A (en) * | 2018-06-25 | 2018-11-16 | 北京京东尚科信息技术有限公司 | Obtain method, server and the system of flight record data |
CN110770728A (en) * | 2018-10-29 | 2020-02-07 | 深圳市大疆创新科技有限公司 | Unmanned aerial vehicle control method, unmanned aerial vehicle and terminal for controlling unmanned aerial vehicle |
CN110770728B (en) * | 2018-10-29 | 2024-04-16 | 深圳市大疆创新科技有限公司 | Unmanned aerial vehicle control method, unmanned aerial vehicle and terminal for controlling unmanned aerial vehicle |
CN110720123A (en) * | 2018-10-31 | 2020-01-21 | 深圳市大疆创新科技有限公司 | Control method and control equipment for mobile platform |
US20220224695A1 (en) * | 2018-12-18 | 2022-07-14 | At&T Intellectual Property I, L.P. | Anchoring Client Devices for Network Service Access Control |
CN111431854A (en) * | 2020-02-23 | 2020-07-17 | 中国科学院信息工程研究所 | Wi-Fi received signal strength-based double-factor authentication method and electronic device |
CN111679271A (en) * | 2020-06-15 | 2020-09-18 | 杭州海康威视数字技术股份有限公司 | Target tracking method, target tracking device, monitoring system and storage medium |
CN111679271B (en) * | 2020-06-15 | 2023-03-14 | 杭州海康威视数字技术股份有限公司 | Target tracking method, target tracking device, monitoring system and storage medium |
CN114093201A (en) * | 2020-08-24 | 2022-02-25 | 中移(成都)信息通信科技有限公司 | Flight equipment management method, device, equipment and storage medium |
CN114093201B (en) * | 2020-08-24 | 2023-08-15 | 中移(成都)信息通信科技有限公司 | Flight equipment management method, device, equipment and storage medium |
WO2024020856A1 (en) * | 2022-07-27 | 2024-02-01 | Oppo广东移动通信有限公司 | Transmission method and apparatus for authentication information, and device and medium |
WO2024066433A1 (en) * | 2022-09-30 | 2024-04-04 | 南京壮大智能科技研究院有限公司 | Unmanned aerial vehicle remote power switch apparatus having identity information identification function |
CN115564315B (en) * | 2022-11-28 | 2023-09-22 | 苏州维伟思医疗科技有限公司 | Unmanned aerial vehicle control method, server, control terminal and storage medium |
CN115564315A (en) * | 2022-11-28 | 2023-01-03 | 苏州维伟思医疗科技有限公司 | Unmanned aerial vehicle control method, server, control terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
EP3158553B1 (en) | 2018-11-28 |
DK3158553T3 (en) | 2019-03-18 |
JP6431186B2 (en) | 2018-11-28 |
JP2017532237A (en) | 2017-11-02 |
EP3158553A1 (en) | 2017-04-26 |
EP3158553A4 (en) | 2017-11-15 |
WO2016154948A1 (en) | 2016-10-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107615358A (en) | For identifying the Verification System and method of authorized participant | |
CN107409051A (en) | For generating the Verification System and method of air traffic control | |
CN107407915A (en) | For generating the Verification System and method of air traffic control | |
CN107408352A (en) | System and method for the communication of geography fence device | |
CN107409174A (en) | System and method for the operation of control unmanned vehicle | |
CN107408351A (en) | For generating the Verification System and method of air traffic control | |
CN107615359A (en) | For detecting the Verification System and method of unwarranted unmanned vehicle activity | |
CN107615785A (en) | System and method for showing geographical railing device information | |
CN107430403A (en) | System and method with geography fence facility level | |
CN107533331A (en) | Geography fence equipment with dynamic characteristic | |
CN107430402A (en) | For being identified to geographical railing device and the system and method for certification | |
CN107531324A (en) | System and method for moving geography fence | |
JP6652620B2 (en) | System for operating unmanned aerial vehicles | |
JP7146834B2 (en) | Method and system for determining level of authorization for unmanned aerial vehicle (UAV) operation | |
JP6676727B2 (en) | Method and system for determining the level of authentication for unmanned aerial vehicle (UAV) operation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180119 |